Patents by Inventor Michael Dymshits

Michael Dymshits has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11687769
    Abstract: Machine learning techniques can be used to train a classifier, in some embodiments, to accurately detect similarities between different records of user activity for a same user. When more recent data is received, newer data can be analyzed by selectively removing particular sub-groups of data to see if there is any particular data that accounts for a large difference (e.g. when run through a classifier that has been trained to produce similar results for known activity data from a same user). If a sub-group of data is identified as being significantly different from other user data, this may indicate an account breach. Advanced machine learning techniques described herein may be applicable to a variety of different environments.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: June 27, 2023
    Assignee: PayPal, Inc.
    Inventors: David Tolpin, Benjamin Hillel Myara, Michael Dymshits
  • Patent number: 11455517
    Abstract: Anomalies in a data set may be difficult to detect when individual items are not gross outliers from a population average. Disclosed is an anomaly detector that includes neural networks such as an auto-encoder and a discriminator. The auto-encoder and the discriminator may be trained on a training set that does not include anomalies. During training, an auto-encoder generates an internal representation from the training set, and reconstructs the training set from the internal representation. The training continues until data loss in the reconstructed training set is below a configurable threshold. The discriminator may be trained until the internal representation is constrained to a multivariable unit normal. Once trained, the auto-encoder and discriminator identify anomalies in the evaluation set. The identified anomalies in an evaluation set may be linked to transaction, security breach or population trends, but broadly, disclosed techniques can be used to identify anomalies in any suitable population.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: September 27, 2022
    Assignee: PayPal, Inc.
    Inventors: David Tolpin, Amit Batzir, Nofar Betzalel, Michael Dymshits, Benjamin Hillel Myara, Liron Ben Kimon
  • Patent number: 11410047
    Abstract: Systems and methods for anomaly detection includes accessing first data comprising a plurality of historical reversion transactions. A plurality of legitimate transactions are determined from the plurality of historical reversion transactions. An autoencoder is trained using the plurality of legitimate transactions to generate a trained autoencoder capable of measuring a given transaction for similarity to the plurality of legitimate transactions. A first reconstructed transaction is generated by the trained autoencoder using a first transaction. The first transaction is determined to be anomalous based on a reconstruction difference between the first transaction and the first reconstructed transaction.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: August 9, 2022
    Assignee: PAYPAL, INC.
    Inventors: Liron Florens Ben Kimon, Michael Dymshits, Albert Zelmanovitch, Dan Ayash
  • Publication number: 20220058493
    Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.
    Type: Application
    Filed: June 28, 2021
    Publication date: February 24, 2022
    Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
  • Patent number: 11049021
    Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.
    Type: Grant
    Filed: October 5, 2017
    Date of Patent: June 29, 2021
    Assignee: PayPal, Inc.
    Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
  • Patent number: 10915629
    Abstract: Systems and methods for detecting data exfiltration using domain name system (DNS) queries include, in various embodiments, performing operations that include parsing a DNS query to determine whether that DNS query is likely to contain hidden data that is being exfiltrated from a system or network. Statistical methods can be used to analyze the DNS query to determine a likelihood whether each of a plurality of segments of the DNS query are indicative of data exfiltration methods. If one or multiple DNS queries are deemed suspicious based on the analysis, a security action on the DNS query can be performed, including sending an alert and/or blocking the DNS query from being forwarded.
    Type: Grant
    Filed: November 2, 2017
    Date of Patent: February 9, 2021
    Assignee: PayPal, Inc.
    Inventors: Michael Dymshits, David Tolpin, Eli Strajnik, Benjamin Hillel Myara, Liron Ben Kimon
  • Patent number: 10706148
    Abstract: The systems and methods that detect a malicious process using count vectors are provided. Count vectors store a number and types of system calls that a process executed in a configurable time interval. The count vectors are provided to a temporal convolution network and a spatial convolution network. The temporal convolution network generates a temporal output by passing the count vectors through temporal filters that identify temporal features of the process. The spatial convolution network generates a spatial output by passing the count vectors through spatial filters that identify spatial features of the process. The temporal output and the spatial output are merged into a summary representation of the process. The malware detection system uses the summary representation to determine that the process as a malicious process.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: July 7, 2020
    Assignee: PayPal, Inc.
    Inventors: Michael Dymshits, Benjamin Hillel Myara
  • Publication number: 20200210849
    Abstract: Systems and methods for anomaly detection includes accessing first data comprising a plurality of historical reversion transactions. A plurality of legitimate transactions are determined from the plurality of historical reversion transactions. An autoencoder is trained using the plurality of legitimate transactions to generate a trained autoencoder capable of measuring a given transaction for similarity to the plurality of legitimate transactions. A first reconstructed transaction is generated by the trained autoencoder using a first transaction. The first transaction is determined to be anomalous based on a reconstruction difference between the first transaction and the first reconstructed transaction.
    Type: Application
    Filed: December 31, 2018
    Publication date: July 2, 2020
    Inventors: Liron Florens Ben Kimon, Michael Dymshits, Albert Zelmanovitch, Dan Ayash
  • Patent number: 10452847
    Abstract: The systems and methods that detect malware from count vectors are provided. A count vector having multiple components is generated. The count vector tracks a number and types of system calls generated by a process. Each component in the count vector is mapped to a type of a system call that exists in an operating system. Multiple system calls generated by the process are received over a first time interval. Each system call is mapped to a component in the count vector. The count vectors are aggregated according to a second time interval into a vector packet. The vector packet is transmitted over a network to a malware detection system that uses the count vectors in the vector packet to determine whether the process is a malware process.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: October 22, 2019
    Assignee: PayPal, Inc.
    Inventors: David Tolpin, Michael Dymshits
  • Publication number: 20190188379
    Abstract: The systems and methods that detect a malicious process using count vectors are provided. Count vectors store a number and types of system calls that a process executed in a configurable time interval. The count vectors are provided to a temporal convolution network and a spatial convolution network. The temporal convolution network generates a temporal output by passing the count vectors through temporal filters that identify temporal features of the process. The spatial convolution network generates a spatial output by passing the count vectors through spatial filters that identify spatial features of the process. The temporal output and the spatial output are merged into a summary representation of the process. The malware detection system uses the summary representation to determine that the process as a malicious process.
    Type: Application
    Filed: December 18, 2017
    Publication date: June 20, 2019
    Applicant: PayPal, Inc.
    Inventors: Michael Dymshits, Benjamin Hillel Myara
  • Publication number: 20190130100
    Abstract: Systems and methods for detecting data exfiltration using domain name system (DNS) queries include, in various embodiments, performing operations that include parsing a DNS query to determine whether that DNS query is likely to contain hidden data that is being exfiltrated from a system or network. Statistical methods can be used to analyze the DNS query to determine a likelihood whether each of a plurality of segments of the DNS query are indicative of data exfiltration methods. If one or multiple DNS queries are deemed suspicious based on the analysis, a security action on the DNS query can be performed, including sending an alert and/or blocking the DNS query from being forwarded.
    Type: Application
    Filed: November 2, 2017
    Publication date: May 2, 2019
    Inventors: Michael Dymshits, David Tolpin, Eli Strajnik, Benjamin Hillel Myara, Liron Ben Kimon
  • Publication number: 20190130254
    Abstract: Anomalies in a data set may be difficult to detect when individual items are not gross outliers from a population average. Disclosed is an anomaly detector that includes neural networks such as an auto-encoder and a discriminator. The auto-encoder and the discriminator may be trained on a training set that does not include anomalies. During training, an auto-encoder generates an internal representation from the training set, and reconstructs the training set from the internal representation. The training continues until data loss in the reconstructed training set is below a configurable threshold. The discriminator may be trained until the internal representation is constrained to a multivariable unit normal. Once trained, the auto-encoder and discriminator identify anomalies in the evaluation set. The identified anomalies in an evaluation set may be linked to transaction, security breach or population trends, but broadly, disclosed techniques can be used to identify anomalies in any suitable population.
    Type: Application
    Filed: October 26, 2017
    Publication date: May 2, 2019
    Inventors: David Tolpin, Amit Batzir, Nofar Betzalel, Michael Dymshits, Benjamin Hillel Myara, Liron Ben Kimon
  • Publication number: 20190108449
    Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.
    Type: Application
    Filed: October 5, 2017
    Publication date: April 11, 2019
    Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
  • Publication number: 20190005408
    Abstract: Machine learning techniques can be used to train a classifier, in some embodiments, to accurately detect similarities between different records of user activity for a same user. When more recent data is received, newer data can be analyzed by selectively removing particular sub-groups of data to see if there is any particular data that accounts for a large difference (e.g. when run through a classifier that has been trained to produce similar results for known activity data from a same user). If a sub-group of data is identified as being significantly different from other user data, this may indicate an account breach. Advanced machine learning techniques described herein may be applicable to a variety of different environments.
    Type: Application
    Filed: June 30, 2017
    Publication date: January 3, 2019
    Inventors: David Tolpin, Benjamin Hillel Myara, Michael Dymshits
  • Publication number: 20180082060
    Abstract: The systems and methods that detect malware from count vectors are provided. A count vector having multiple components is generated. The count vector tracks a number and types of system calls generated by a process. Each component in the count vector is mapped to a type of a system call that exists in an operating system. Multiple system calls generated by the process are received over a first time interval. Each system call is mapped to a component in the count vector. The count vectors are aggregated according to a second time interval into a vector packet. The vector packet is transmitted over a network to a malware detection system that uses the count vectors in the vector packet to determine whether the process is a malware process.
    Type: Application
    Filed: September 16, 2016
    Publication date: March 22, 2018
    Inventors: David Tolpin, Michael Dymshits