Patents by Inventor Rebecca A. Borbely

Rebecca A. Borbely has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170070480
    Abstract: An anonymous information sharing service is described herein. The anonymous information sharing service includes performing anonymous authentication of a user who would like to report an incident, anonymizing incident data, and sharing the incident data with multiple users of the anonymous information sharing service.
    Type: Application
    Filed: April 11, 2016
    Publication date: March 9, 2017
    Inventors: Ian T. Blumenfeld, Rebecca A. Borbely, Frederick W. Wolfinger, JR., Mark V. Raugas
  • Patent number: 9525702
    Abstract: Methods, system, and media for determining similar malware samples are disclosed. Two or more malware samples are received and analyzed to extract information from the two or more malware samples. The extracted information is converted to a plurality of sets of strings. A similarity between the two or more malware samples is determined based on the plurality of the sets of strings.
    Type: Grant
    Filed: September 2, 2015
    Date of Patent: December 20, 2016
    Assignee: Cyberpoint International LLC
    Inventors: Charles Cabot, Rebecca A. Borbely, Michael W. West, Mark V. Raugas
  • Publication number: 20160173516
    Abstract: Methods, system, and media for detecting malware are disclosed. A network may be monitored for a configured time interval collecting all of or some of the network traffic or samples of the network traffic. Feature vectors may be extracted from the network traffic resulting in feature vectors. One or more machine learning models may be applied to the feature vectors producing a score. The score may indicate the presence of malware or the presence of a particular type of malware. One or more scores obtained by applying learning models may be fused by another machine learning model into a resulting score. A threshold value may be calculated to accompany a score indicating the likelihood that the traffic sample indicates the presence of malware and the likely effectiveness of planned remediation effort. An alert may be generated from the score and the threshold when the threshold is exceeded.
    Type: Application
    Filed: February 19, 2016
    Publication date: June 16, 2016
    Inventors: Mark V. Raugas, Rebecca A. Borbely, Michael W. West, James L. Ulrich
  • Publication number: 20160127388
    Abstract: Methods, system, and media for determining similar malware samples are disclosed. Two or more malware samples are received and analyzed to extract information from the two or more malware samples. The extracted information is converted to a plurality of sets of strings. A similarity between the two or more malware samples is determined based on the plurality of the sets of strings.
    Type: Application
    Filed: September 2, 2015
    Publication date: May 5, 2016
    Inventors: Charles Cabot, Rebecca A. Borbely, Michael W. West, Mark V. Raugas
  • Patent number: 9313177
    Abstract: An anonymous information sharing service is described herein. The anonymous information sharing service includes performing anonymous authentication of a user who would like to report an incident, anonymizing incident data, and sharing the incident data with multiple users of the anonymous information sharing service.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: April 12, 2016
    Assignee: TruSTAR Technology, LLC
    Inventors: Ian T. Blumenfeld, Rebecca A. Borbely, Frederick W. Wolfinger, Jr., Mark V. Raugas
  • Patent number: 9288220
    Abstract: Methods, system, and media for detecting malware are disclosed. A network may be monitored to collect samples of the network traffic. Feature vectors may be extracted from the sampled network traffic. One or more machine learning models may be applied to the feature vectors to produce a score indicative of the presence of a particular type of malware. One or more scores obtained by applying the machine learning models may be fused by another machine learning model into a resulting score. A threshold value may be calculated to accompany a score indicating the likelihood that the traffic sample indicates the presence of malware and the likely effectiveness of planned remediation effort. An alert may be generated from the score and the threshold when the threshold is acceded.
    Type: Grant
    Filed: November 7, 2013
    Date of Patent: March 15, 2016
    Assignee: CyberPoint International LLC
    Inventors: Mark V. Raugas, Rebecca A. Borbely, Michael W. West, James L. Ulrich
  • Patent number: 9197665
    Abstract: Methods, system, and media for determining similar malware samples are disclosed. Two or more malware samples are received and analyzed to extract information from the two or more malware samples. The extracted information is converted to a plurality of sets of strings. A similarity between the two or more malware samples is determined based on the plurality of the sets of strings.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: November 24, 2015
    Inventors: Charles Cabot, Rebecca A. Borbely, Michael W. West, Mark V. Raugas
  • Publication number: 20150244681
    Abstract: An anonymous information sharing service is described herein. The anonymous information sharing service includes performing anonymous authentication of a user who would like to report an incident, anonymizing incident data, and sharing the incident data with multiple users of the anonymous information sharing service.
    Type: Application
    Filed: February 20, 2015
    Publication date: August 27, 2015
    Inventors: Ian T. Blumenfeld, Rebecca A. Borbely, Frederick W. Wolfinger, JR., Mark V. Raugas
  • Publication number: 20150128263
    Abstract: Methods, system, and media for detecting malware are disclosed. A network may be monitored for a configured time interval collecting all of or some of the network traffic or samples of the network traffic. Feature vectors may be extracted from the network traffic resulting in feature vectors. One or more machine learning models may be applied to the feature vectors producing a score. The score may indicate the presence of malware or the presence of a particular type of malware. One or more scores obtained by applying learning models may be fused by another machine learning model into a resulting score. A threshold value may be calculated to accompany a score indicating the likelihood that the traffic sample indicates the presence of malware and the likely effectiveness of planned remediation effort. An alert may be generated from the score and the threshold when the threshold is acceded. The alert may be presented to a user based on an indication by the user as to the type of malware of interest.
    Type: Application
    Filed: November 7, 2013
    Publication date: May 7, 2015
    Applicant: Cyberpoint International, LLC
    Inventors: Mark V. Raugas, Rebecca A. Borbely, Mike West, James L. Ulrich