Patents by Inventor Stephen Fletcher
Stephen Fletcher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240338427Abstract: Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.Type: ApplicationFiled: June 17, 2024Publication date: October 10, 2024Inventors: Baharak Saberidokht, Farshid Marbouti, Stephen Fletcher
-
Publication number: 20240220617Abstract: In some implementations, a system may receive a shell script associated with a computing device. The system may generate a character frequency feature vector based on the shell script. The system may input text of the shell script to a convolutional neural network (CNN) branch of a trained deep learning model. The system may input the character frequency feature vector to a feedforward neural network (FNN) branch of the trained deep learning model. The system may determine using the trained deep learning model, respective probability scores for each of a plurality of obfuscation types for the shell script based on a combined output of the CNN branch and the FNN branch. The system may detect whether the shell script is obfuscated based on respective probability scores for each of the plurality of obfuscation types determined for the shell script.Type: ApplicationFiled: March 19, 2024Publication date: July 4, 2024Inventors: Farshid MARBOUTI, Sarvani KARE, Boshika TARA, Stephen FLETCHER, Patrick SOFO
-
Patent number: 12013921Abstract: Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.Type: GrantFiled: May 18, 2023Date of Patent: June 18, 2024Assignee: Capital One Services, LLCInventors: Baharak Saberidokht, Farshid Marbouti, Stephen Fletcher
-
Patent number: 11954202Abstract: In some implementations, a system may receive a shell script associated with a computing device. The system may generate a character frequency feature vector based on the shell script. The system may input text of the shell script to a convolutional neural network (CNN) branch of a trained deep learning model. The system may input the character frequency feature vector to a feedforward neural network (FNN) branch of the trained deep learning model. The system may determine using the trained deep learning model, a respective probability score for each of a plurality of obfuscation types for the shell script based on a combined output of the CNN branch and the FNN branch. The system may detect whether the shell script is obfuscated based on the respective probability score for each of the plurality of obfuscation types determined for the shell script.Type: GrantFiled: May 14, 2021Date of Patent: April 9, 2024Assignee: Capital One Services, LLCInventors: Farshid Marbouti, Sarvani Kare, Boshika Tara, Stephen Fletcher, Patrick Sofo
-
Patent number: 11948379Abstract: A system including at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive an email addressed to a user; separate the email into a plurality of email components; analyze, using respective machine-learning techniques, each of the plurality of email components; feed the analysis of each of the plurality of email components into a stacked ensemble analyzer; and based on an output of the stacked ensemble analyzer, determine whether the email is malicious.Type: GrantFiled: October 12, 2020Date of Patent: April 2, 2024Assignee: CAPITAL ONE SERVICES, LLCInventors: Christopher Bayan Bruss, Stephen Fletcher, Lei Yu, Jakob Kressel
-
Publication number: 20240064166Abstract: Methods and systems are described herein for detecting anomalous access to system resources. An anomaly detection system may access system events from one or more computing devices and may generate entries from the system events. Each entry may include a corresponding timestamp indicating a time when a corresponding system event occurred, a corresponding user identifier indicating a user account within a computing environment associated with the corresponding system event, a corresponding location identifier indicating a location within the computing environment, and a corresponding action identifier indicating an action that the user account performed with respect to the location or an object within the computing environment. The generated entries may be aggregated and input into an anomaly detection model to obtain anomalous activity identified by the model.Type: ApplicationFiled: November 3, 2023Publication date: February 22, 2024Applicant: Capital One Services, LLCInventors: Sarvani KARE, Vannia GONZALEZ MACIAS, Farshid MARBOUTI, Stephen FLETCHER, Boshika TARA, Patrick SOFO, Urvish PATEL
-
Patent number: 11856014Abstract: Methods and systems are described herein for detecting anomalous access to system resources. An anomaly detection system may access system events from one or more computing devices and may generate entries from the system events. Each entry may include a corresponding timestamp indicating a time when a corresponding system event occurred, a corresponding user identifier indicating a user account within a computing environment associated with the corresponding system event, a corresponding location identifier indicating a location within the computing environment, and a corresponding action identifier indicating an action that the user account performed with respect to the location or an object within the computing environment. The generated entries may be aggregated and input into an anomaly detection model to obtain anomalous activity identified by the model.Type: GrantFiled: April 23, 2021Date of Patent: December 26, 2023Assignee: Capital One Services, LLCInventors: Sarvani Kare, Vannia Gonzalez Macias, Farshid Marbouti, Stephen Fletcher, Boshika Tara, Patrick Sofo, Urvish Patel
-
Publication number: 20230289412Abstract: Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.Type: ApplicationFiled: May 18, 2023Publication date: September 14, 2023Inventors: Baharak Saberidokht, Farshid Marbouti, Stephen Fletcher
-
Patent number: 11675881Abstract: Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.Type: GrantFiled: October 5, 2022Date of Patent: June 13, 2023Assignee: Capital One Services, LLCInventors: Baharak Saberidokht, Farshid Marbouti, Stephen Fletcher
-
Publication number: 20230046532Abstract: Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.Type: ApplicationFiled: October 5, 2022Publication date: February 16, 2023Inventors: Baharak Saberidokht, Farshid Marbouti, Stephen Fletcher
-
Publication number: 20220366040Abstract: In some implementations, a system may receive a shell script associated with a computing device. The system may generate a character frequency feature vector based on the shell script. The system may input text of the shell script to a convolutional neural network (CNN) branch of a trained deep learning model. The system may input the character frequency feature vector to a feedforward neural network (FNN) branch of the trained deep learning model. The system may determine using the trained deep learning model, a respective probability score for each of a plurality of obfuscation types for the shell script based on a combined output of the CNN branch and the FNN branch. The system may detect whether the shell script is obfuscated based on the respective probability score for each of the plurality of obfuscation types determined for the shell script.Type: ApplicationFiled: May 14, 2021Publication date: November 17, 2022Inventors: Farshid MARBOUTI, Sarvani KARE, Boshika TARA, Stephen FLETCHER, Patrick SOFO
-
Publication number: 20220345473Abstract: Methods and systems are described herein for detecting anomalous access to system resources. An anomaly detection system may access system events from one or more computing devices and may generate entries from the system events. Each entry may include a corresponding timestamp indicating a time when a corresponding system event occurred, a corresponding user identifier indicating a user account within a computing environment associated with the corresponding system event, a corresponding location identifier indicating a location within the computing environment, and a corresponding action identifier indicating an action that the user account performed with respect to the location or an object within the computing environment. The generated entries may be aggregated and input into an anomaly detection model to obtain anomalous activity identified by the model.Type: ApplicationFiled: April 23, 2021Publication date: October 27, 2022Applicant: Capital One Services, LLCInventors: Sarvani KARE, Vannia Gonzalez Macias, Farshid Marbouti, Stephen Fletcher, Boshika Tara, Patrick Sofo, Urvish Patel
-
Patent number: 11481475Abstract: Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.Type: GrantFiled: November 3, 2020Date of Patent: October 25, 2022Assignee: Capital One Services, LLCInventors: Baharak Saberidokht, Farshid Marbouti, Stephen Fletcher
-
Publication number: 20220300707Abstract: A method of determining a definition for a term associated with a specific domain may include: receiving, via a processor, an electronic document that is associated with a specific domain, the electronic document including at least one term; determining a definition of the at least one term via a machine learning model that is trained, based on (i) a plurality of terms associated with the specific domain as training data and (ii) definitions associated with the specific domain and corresponding to the plurality of terms as ground truth, to generate an output definition associated with the specific domain in response to an input term; and transmitting a response to receiving the electronic document that includes the determined definition of the at least one term.Type: ApplicationFiled: March 18, 2021Publication date: September 22, 2022Applicant: Capital One Services, LLCInventors: Sarvani KARE, Stephen FLETCHER
-
Publication number: 20220138288Abstract: Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.Type: ApplicationFiled: November 3, 2020Publication date: May 5, 2022Inventors: Baharak Saberidokht, Farshid Marbouti, Stephen Fletcher
-
Publication number: 20210112095Abstract: A system including at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive an email addressed to a user; separate the email into a plurality of email components; analyze, using respective machine-learning techniques, each of the plurality of email components; feed the analysis of each of the plurality of email components into a stacked ensemble analyzer; and based on an output of the stacked ensemble analyzer, determine whether the email is malicious.Type: ApplicationFiled: October 12, 2020Publication date: April 15, 2021Inventors: Christopher Bayan Bruss, Stephen Fletcher, Lei Yu, Jakob Kressel
-
Patent number: 10879029Abstract: A charged particle device includes an electron emitting part for emitting electrons, an electron irradiated part configured to be irradiated with the electrons emitted from the electron emitting part, a container part configured to evacuate an interior thereof and contain the electron irradiated part in the interior thereof, an electric wire containing part configured to be inserted from an outside of the container part via an insertion part provided in the container part to contain an electric wire through which electricity is conducted to the electron irradiated part contained in the container part, and an insertion-part-side protrusion part configured to surround the electric wire containing part and protrude from a vicinity of the insertion part on an inner wall of the container part to an interior of the container part.Type: GrantFiled: December 25, 2015Date of Patent: December 29, 2020Assignee: Nikon CorporationInventors: Atsushi Yamada, Shohei Suzuki, Takeshi Endo, Takashi Watanabe, Stephen Fletcher, Andriy Denysov
-
Patent number: 10805347Abstract: A system including at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive an email addressed to a user; separate the email into a plurality of email components; analyze, using respective machine-learning techniques, each of the plurality of email components; feed the analysis of each of the plurality of email components into a stacked ensemble analyzer; and based on an output of the stacked ensemble analyzer, determine whether the email is malicious.Type: GrantFiled: July 10, 2019Date of Patent: October 13, 2020Assignee: CAPITAL ONE SERVICES, LLCInventors: Christopher Bayan Bruss, Stephen Fletcher, Lei Yu, Jakob Kressel
-
Publication number: 20190349400Abstract: A system including at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive an email addressed to a user; separate the email into a plurality of email components; analyze, using respective machine-learning techniques, each of the plurality of email components; feed the analysis of each of the plurality of email components into a stacked ensemble analyzer; and based on an output of the stacked ensemble analyzer, determine whether the email is malicious.Type: ApplicationFiled: July 10, 2019Publication date: November 14, 2019Inventors: Christopher Bayan Bruss, Stephen Fletcher, Lei Yu, Jakob Kressel
-
Patent number: 10397272Abstract: A system including at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive an email addressed to a user; separate the email into a plurality of email components; analyze, using respective machine-learning techniques, each of the plurality of email components; feed the analysis of each of the plurality of email components into a stacked ensemble analyzer; and based on an output of the stacked ensemble analyzer, determine whether the email is malicious.Type: GrantFiled: October 23, 2018Date of Patent: August 27, 2019Assignee: CAPITAL ONE SERVICES, LLCInventors: Christopher Bayan Bruss, Stephen Fletcher, Lei Yu, Jakob Kressel