Patents by Inventor Philip K. Newman

Philip K. Newman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11856009
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Grant
    Filed: February 11, 2021
    Date of Patent: December 26, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ashish Mishra, Puhazholi Vetrivel, Philip K Newman, Sudhakar Narayanamurthy
  • Publication number: 20210194899
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Application
    Filed: February 11, 2021
    Publication date: June 24, 2021
    Inventors: Ashish MISHRA, Puhazholi VETRIVEL, Philip K NEWMAN, Sudhakar NARAYANAMURTHY
  • Patent number: 11025665
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Grant
    Filed: June 8, 2020
    Date of Patent: June 1, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
  • Patent number: 10944766
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Grant
    Filed: January 22, 2018
    Date of Patent: March 9, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ashish Mishra, Puhazholi Vetrivel, Philip K Newman, Sudhakar Narayanamurthy
  • Publication number: 20200304538
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Application
    Filed: June 8, 2020
    Publication date: September 24, 2020
    Inventors: Philip K. NEWMAN, Puhazholi VETRIVEL, Sudhakar NARAYANAMURTHY, Ejike E. OFUONYE, Suresh C. PALANI, Ashish MISHRA
  • Patent number: 10715545
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: July 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
  • Patent number: 10701100
    Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: June 30, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy
  • Publication number: 20190098040
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Application
    Filed: January 19, 2018
    Publication date: March 28, 2019
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
  • Publication number: 20190098026
    Abstract: A computing system includes a processor and memory coupled to the processor and storing instructions that, when executed by the processor provide a user interface module. The user interface module is configured to generate a tracker definition user interface having a threat parameter selection user interface element configured to receive a selection of at least one threat parameter, the tracker definition user interface also having a threat value user interface element configured to receive input specifying a threat value to match for the specified at least one threat parameter. The processor is configured to save a tracker based on the selection of at least one threat parameter and the threat value, and wherein the processor is configured to access a threat data store and execute the tracker against the threat data store to provide a tracker result.
    Type: Application
    Filed: January 22, 2018
    Publication date: March 28, 2019
    Inventors: Ashish MISHRA, Puhazholi Vetrivel, Philip K. Newman, Sudhakar Narayanamurthy
  • Publication number: 20180255099
    Abstract: Correlated signals associated with one or more of stored content, content metadata, and activities associated with the stored content of a tenant may be analyzed and alert(s) determined based on alert threshold(s) or broader “abnormal” pattern detection. Different recipients for different alerts or alert levels may be designated and the alert(s) transmitted to the designated recipients. Alerts may also be displayed through an alert management dashboard of a protection service. The alert(s) and the results of the analysis may also be provided to a policy engine for use in adjusting or creating rules within a policy, alert thresholds, and signal collection/analysis. Post-fact investigations may also be initiated upon alerts.
    Type: Application
    Filed: March 2, 2017
    Publication date: September 6, 2018
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Binyan Chen, Ben Appleby, Anupama Janardhan, Rui Chen, Krishna Kumar Parthasarathy, Suresh C. Palani, Puhazholi Vetrivel, Philip K. Newman, Michael A. Wilde
  • Publication number: 20180191771
    Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.
    Type: Application
    Filed: March 30, 2017
    Publication date: July 5, 2018
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy