Patents by Inventor Raoul Christopher Johnson
Raoul Christopher Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11805129Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.Type: GrantFiled: December 28, 2021Date of Patent: October 31, 2023Assignee: PAYPAL, INC.Inventors: Raoul Christopher Johnson, Ran Sun
-
Patent number: 11665199Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.Type: GrantFiled: January 11, 2021Date of Patent: May 30, 2023Assignee: PAYPAL, INC.Inventors: Raoul Christopher Johnson, Ran Sun
-
Publication number: 20220166796Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.Type: ApplicationFiled: January 11, 2021Publication date: May 26, 2022Inventors: Raoul Christopher Johnson, Ran Sun
-
Publication number: 20220124097Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.Type: ApplicationFiled: December 28, 2021Publication date: April 21, 2022Inventors: Raoul Christopher Johnson, Ran Sun
-
Patent number: 11265323Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.Type: GrantFiled: November 13, 2018Date of Patent: March 1, 2022Assignee: PAYPAL, INC.Inventors: Raoul Christopher Johnson, Ran Sun
-
Publication number: 20220058493Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.Type: ApplicationFiled: June 28, 2021Publication date: February 24, 2022Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
-
Patent number: 11080388Abstract: Images related to one or more attacks to a service provider system may be analyzed to improve the security of the service provider system. Each of the images may be segmented into multiple segments. Each of the segments is analyzed independently to determine whether the segment includes obfuscated data and if so, which one of the data obfuscation techniques was used to generate the obfuscated data. Additional information regarding the obfuscated data may be derived from other segments that include unobfuscated data and from the metadata of the image. A data restoration algorithm may be configured accordingly to restore the obfuscated data. The restored data, as well as a context derived for the image, may be used to adjust one or more security parameters of the service provider system to improve the security of the service provider system.Type: GrantFiled: October 2, 2018Date of Patent: August 3, 2021Assignee: PayPal, Inc.Inventors: Raoul Christopher Johnson, Bradley Wardman, Sai Raghavendra Maddhuri Venkata Subramaniya
-
Patent number: 11049021Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.Type: GrantFiled: October 5, 2017Date of Patent: June 29, 2021Assignee: PayPal, Inc.Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
-
Patent number: 10893072Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.Type: GrantFiled: August 17, 2018Date of Patent: January 12, 2021Assignee: PayPal, Inc.Inventors: Raoul Christopher Johnson, Ran Sun
-
Publication number: 20200159907Abstract: Images related to one or more attacks to a service provider system may be analyzed to improve the security of the service provider system. Each of the images may be segmented into multiple segments. Each of the segments is analyzed independently to determine whether the segment includes obfuscated data and if so, which one of the data obfuscation techniques was used to generate the obfuscated data. Additional information regarding the obfuscated data may be derived from other segments that include unobfuscated data and from the metadata of the image. A data restoration algorithm may be configured accordingly to restore the obfuscated data. The restored data, as well as a context derived for the image, may be used to adjust one or more security parameters of the service provider system to improve the security of the service provider system.Type: ApplicationFiled: October 2, 2018Publication date: May 21, 2020Inventors: Raoul Christopher Johnson, Bradley Wardman, Sai Raghavendra Maddhuri Venkata Subramaniya
-
Publication number: 20200153836Abstract: Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.Type: ApplicationFiled: November 13, 2018Publication date: May 14, 2020Inventors: Raoul Christopher Johnson, Ran Sun
-
Publication number: 20200059489Abstract: Methods and systems for using cloned accounts to track attacks on user accounts are described. A user login attempt is detected for a user account from a client computing device. A determination is made that the user is not a legitimate user. The user is routed to a cloned user account. An analysis of the interaction between the user and the cloned user account is performed.Type: ApplicationFiled: August 17, 2018Publication date: February 20, 2020Inventors: Raoul Christopher Johnson, Ran Sun
-
Patent number: 10445163Abstract: Computer system drift can occur when a computer system or a cluster of computer systems deviates from ideal and/or desired behavior. In a server farm, for example, many different machines may be identically configured to work in conjunction with each other to provide an electronic service (serving web pages, processing electronic payment transactions, etc.). Over time, however, one or more of these systems may drift from previous behavior. Early drift detection can be important, especially in large enterprises, to avoiding costly downtime. Changes in a computer's configuration files, network connections, and/or executable processes can indicate ongoing drift, but collecting this information at scale can be difficult. By using certain hashing and min-Hash techniques, however, drift detection can be streamlined and accomplished for large scale operations. Velocity of drift may also be tracked using a decay function.Type: GrantFiled: September 28, 2017Date of Patent: October 15, 2019Assignee: PAYPAL, INC.Inventors: Omri Moshe Lahav, Raoul Christopher Johnson, David Tolpin
-
Publication number: 20190108449Abstract: Aspects of the present disclosure involve systems, methods, devices, and the like for generating compact tree representations applicable to machine learning. In one embodiment, a system is introduced that can retrieve a decision tree structure to generate a compact tree representation model. The compact tree representation model may come in the form of a matrix design to maintain the relationships expressed by the decision tree structure.Type: ApplicationFiled: October 5, 2017Publication date: April 11, 2019Inventors: Raoul Christopher Johnson, Omri Moshe Lahav, Michael Dymshits, David Tolpin
-
Publication number: 20190095263Abstract: Computer system drift can occur when a computer system or a cluster of computer systems deviates from ideal and/or desired behavior. In a server farm, for example, many different machines may be identically configured to work in conjunction with each other to provide an electronic service (serving web pages, processing electronic payment transactions, etc.). Over time, however, one or more of these systems may drift from previous behavior. Early drift detection can be important, especially in large enterprises, to avoiding costly downtime. Changes in a computer's configuration files, network connections, and/or executable processes can indicate ongoing drift, but collecting this information at scale can be difficult. By using certain hashing and min-Hash techniques, however, drift detection can be streamlined and accomplished for large scale operations. Velocity of drift may also be tracked using a decay function.Type: ApplicationFiled: September 28, 2017Publication date: March 28, 2019Inventors: Omri Moshe Lahav, Raoul Christopher Johnson, David Tolpin