Patents by Inventor Raoul Christopher Johnson

Raoul Christopher Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11805129
    Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.
    Type: Grant
    Filed: December 28, 2021
    Date of Patent: October 31, 2023
    Assignee: PAYPAL, INC.
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Patent number: 11665199
    Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: May 30, 2023
    Assignee: PAYPAL, INC.
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Publication number: 20220166796
    Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.
    Type: Application
    Filed: January 11, 2021
    Publication date: May 26, 2022
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Publication number: 20220124097
    Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.
    Type: Application
    Filed: December 28, 2021
    Publication date: April 21, 2022
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Patent number: 11265323
    Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: March 1, 2022
    Assignee: PAYPAL, INC.
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Publication number: 20220058493
    Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.
    Type: Application
    Filed: June 28, 2021
    Publication date: February 24, 2022
    Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
  • Patent number: 11080388
    Abstract: Images related to one or more attacks to a service provider system may be analyzed to improve the security of the service provider system. Each of the images may be segmented into multiple segments. Each of the segments is analyzed independently to determine whether the segment includes obfuscated data and if so, which one of the data obfuscation techniques was used to generate the obfuscated data. Additional information regarding the obfuscated data may be derived from other segments that include unobfuscated data and from the metadata of the image. A data restoration algorithm may be configured accordingly to restore the obfuscated data. The restored data, as well as a context derived for the image, may be used to adjust one or more security parameters of the service provider system to improve the security of the service provider system.
    Type: Grant
    Filed: October 2, 2018
    Date of Patent: August 3, 2021
    Assignee: PayPal, Inc.
    Inventors: Raoul Christopher Johnson, Bradley Wardman, Sai Raghavendra Maddhuri Venkata Subramaniya
  • Patent number: 11049021
    Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.
    Type: Grant
    Filed: October 5, 2017
    Date of Patent: June 29, 2021
    Assignee: PayPal, Inc.
    Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
  • Patent number: 10893072
    Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: January 12, 2021
    Assignee: PayPal, Inc.
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Publication number: 20200159907
    Abstract: Images related to one or more attacks to a service provider system may be analyzed to improve the security of the service provider system. Each of the images may be segmented into multiple segments. Each of the segments is analyzed independently to determine whether the segment includes obfuscated data and if so, which one of the data obfuscation techniques was used to generate the obfuscated data. Additional information regarding the obfuscated data may be derived from other segments that include unobfuscated data and from the metadata of the image. A data restoration algorithm may be configured accordingly to restore the obfuscated data. The restored data, as well as a context derived for the image, may be used to adjust one or more security parameters of the service provider system to improve the security of the service provider system.
    Type: Application
    Filed: October 2, 2018
    Publication date: May 21, 2020
    Inventors: Raoul Christopher Johnson, Bradley Wardman, Sai Raghavendra Maddhuri Venkata Subramaniya
  • Publication number: 20200153836
    Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.
    Type: Application
    Filed: November 13, 2018
    Publication date: May 14, 2020
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Publication number: 20200059489
    Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.
    Type: Application
    Filed: August 17, 2018
    Publication date: February 20, 2020
    Inventors: Raoul Christopher Johnson, Ran Sun
  • Patent number: 10445163
    Abstract: Computer system drift can occur when a computer system or a cluster of computer systems deviates from ideal and/or desired behavior. In a server farm, for example, many different machines may be identically configured to work in conjunction with each other to provide an electronic service (serving web pages, processing electronic payment transactions, etc.). Over time, however, one or more of these systems may drift from previous behavior. Early drift detection can be important, especially in large enterprises, to avoiding costly downtime. Changes in a computer's configuration files, network connections, and/or executable processes can indicate ongoing drift, but collecting this information at scale can be difficult. By using certain hashing and min-Hash techniques, however, drift detection can be streamlined and accomplished for large scale operations. Velocity of drift may also be tracked using a decay function.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: October 15, 2019
    Assignee: PAYPAL, INC.
    Inventors: Omri Moshe Lahav, Raoul Christopher Johnson, David Tolpin
  • Publication number: 20190108449
    Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.
    Type: Application
    Filed: October 5, 2017
    Publication date: April 11, 2019
    Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
  • Publication number: 20190095263
    Abstract: Computer system drift can occur when a computer system or a cluster of computer systems deviates from ideal and/or desired behavior. In a server farm, for example, many different machines may be identically configured to work in conjunction with each other to provide an electronic service (serving web pages, processing electronic payment transactions, etc.). Over time, however, one or more of these systems may drift from previous behavior. Early drift detection can be important, especially in large enterprises, to avoiding costly downtime. Changes in a computer's configuration files, network connections, and/or executable processes can indicate ongoing drift, but collecting this information at scale can be difficult. By using certain hashing and min-Hash techniques, however, drift detection can be streamlined and accomplished for large scale operations. Velocity of drift may also be tracked using a decay function.
    Type: Application
    Filed: September 28, 2017
    Publication date: March 28, 2019
    Inventors: Omri Moshe Lahav, Raoul Christopher Johnson, David Tolpin