Patents by Inventor Vishal Kapoor
Vishal Kapoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9436826Abstract: The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file.Type: GrantFiled: June 16, 2011Date of Patent: September 6, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Vishal Kapoor, Jonathan Mark Keller, Ajith Kumar, Adrian M. Marinescu, Marc E. Seinfeld, Anil Francis Thomas, Michael Sean Jarrett, Joseph J. Johnson, Joseph L. Faulhaber
-
Patent number: 9311048Abstract: A file receiver receives an electronic structure file that includes structure-file data associated with a spatial arrangement and detects a content object for processing that includes content-object data. A file transformation engine transforms the structure-file data from the structure file into an electronic record. A rendering engine renders an image of the transformed structure-file data arranged in the spatial arrangement. An interface engine detects an input corresponding to specification of a position of a data segment. A parsing engine defines a segment-position specification indicative of the position. A template engine generates an electronic template that associates an identifier of the data segment with the segment-position specification and associates the electronic template with a template identifier. A record classifier determines that the content object corresponds to the template identifier.Type: GrantFiled: March 6, 2015Date of Patent: April 12, 2016Assignee: PEARSON EDUCATION, INC.Inventors: Vishal Kapoor, Miles Loring, Cole Cecil, Jesse Peterson, Umamakeswaran Veerasingam, Sanjay Zope
-
Publication number: 20160094476Abstract: A distributed processing system is disclosed herein. The distributed processing system includes a server, a database server, and an application server that are interconnected via a network, and connected via the network to a plurality of independent processing units. The independent processing units can include an analysis engine that is machine-learning-capable, and thus uniquely completes its processing tasks. The server can provide one or several pieces of data to one or several of the independent processing units, can receive analysis results from these one or several independent processing units, and can update the result based on a value characterizing the machine learning of the independent processing unit.Type: ApplicationFiled: September 29, 2015Publication date: March 31, 2016Inventors: Nicholas A. Dronen, Peter W. Foltz, Holly Garner, Miles T. Loring, Vishal Kapoor
-
Patent number: 9299264Abstract: Generally, embodiments of the disclosure are directed to methods, computer readable medium, servers, and systems for providing sound assessment and remediation between a computing device and a user instrument. The sound assessment may be based on algorithmic composition or a threshold to remediate performance of providing a plurality of sounds.Type: GrantFiled: March 20, 2014Date of Patent: March 29, 2016Assignee: PEARSON EDUCATION, INC.Inventors: Cole Joseph Cecil, Bryce Winton Rodgers, Vishal Kapoor, Piyush Dubey
-
Publication number: 20160042198Abstract: Generally, embodiments of the invention are directed to methods, computer readable medium, servers, and systems for deidentified access of data. The deidentified access is permitted with the use of an identifier that uniquely indicates an outcome, the coding of the identifier obscures unaided human interpretation of the outcome, and the identifier uniquely identifies data for remediating performance associated with future outcomes.Type: ApplicationFiled: June 30, 2015Publication date: February 11, 2016Applicant: Pearson Education, Inc.Inventors: Vishal Kapoor, Cole Joseph Cecil, David Earl Rodgers
-
Publication number: 20150269852Abstract: Generally, embodiments of the disclosure are directed to methods, computer readable medium, servers, and systems for providing sound assessment and remediation between a computing device and a user instrument. The sound assessment may be based on algorithmic composition or a threshold to remediate performance of providing a plurality of sounds.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: Pearson Education, Inc.Inventors: Cole Joseph Cecil, Bryce Winton Rodgers, Vishal Kapoor, Piyush Dubey
-
Publication number: 20150187223Abstract: Generally, embodiments of the invention are directed to methods, computer readable medium, servers, and systems for deidentified access of instructional content. The deidentified access is permitted with the use of an identifier that uniquely indicates an outcome of a diagnostic test, the coding of the identifier obscures unaided human interpretation of the outcome, and the identifier uniquely identifies instructional content for remediating performance on the diagnostic test.Type: ApplicationFiled: December 30, 2013Publication date: July 2, 2015Applicant: Pearson Education, Inc.Inventors: Vishal Kapoor, Cole Joseph Cecil, David Earl Rodgers
-
Publication number: 20150096029Abstract: An anti-malware system dynamically loads and unloads additional malware detection signatures based on a collection of data sources that indicate what signatures are relevant to a host machine in its current environment. A signature selector component determines what relevant signatures should be loaded. The signature selector component uses a variety of data sources either individually, or in combination, to determine relevancy of the available malware detection signatures. The anti-malware system dynamically determines which of the available malware detection signatures and classes of signatures are relevant and should be provided to a machine based on available information. The malware detection signatures are obtained and loaded automatically from one or more sources when a threat becomes relevant. A program or application may be blocked from accessing files until the relevant malware detection signatures have been loaded onto the machine.Type: ApplicationFiled: December 5, 2014Publication date: April 2, 2015Applicant: MICROSOFT CORPORATIONInventors: Joseph Johnson, Vishal Kapoor, Michael S. Jarrett, Ronald L. Thompson
-
Publication number: 20150052184Abstract: A distributed processing system is disclosed herein. The distributed processing system includes a server, a database server, and an application server that are interconnected via a network, and connected via the network to a plurality of independent processing units. The independent processing units can include an analysis engine that is machine learning capable, and thus uniquely completes its processing tasks. The server can provide one or several pieces of data to one or several of the independent processing units, can receive an analysis results from the one or several independent processing units, and can update the result based on a value characterizing the machine learning of the independent processing unit.Type: ApplicationFiled: August 18, 2014Publication date: February 19, 2015Inventors: Holly Garner, Miles T. Loring, Vishal Kapoor
-
Patent number: 8925085Abstract: An anti-malware system dynamically loads and unloads additional malware detection signatures based on a collection of data sources that indicate what signatures are relevant to a host machine in its current environment. A signature selector component determines what relevant signatures should be loaded. The signature selector component uses a variety of data sources either individually, or in combination, to determine relevancy of the available malware detection signatures. The anti-malware system dynamically determines which of the available malware detection signatures and classes of signatures are relevant and should be provided to a machine based on available information. The malware detection signatures are obtained and loaded automatically from one or more sources when a threat becomes relevant. A program or application may be blocked from accessing files until the relevant malware detection signatures have been loaded onto the machine.Type: GrantFiled: November 15, 2012Date of Patent: December 30, 2014Assignee: Microsoft CorporationInventors: Joseph Johnson, Vishal Kapoor, Michael S. Jarrett, Ronald L. Thompson
-
Publication number: 20140308650Abstract: Systems and methods for evaluation control are disclosed herein. An evaluation control system can be used in evaluating one or several artifacts. The evaluation control system can be used to verify an evaluation and/or to provide evaluation training. The evaluation system can include a processor and a user device. The evaluation system can provide one or several artifacts and evaluation criteria to an evaluator. The evaluation system can receive one or several tags associated with the one or several artifacts and/or the evaluation criteria. The one or several tags can include information that, in connection with the evaluation criteria, support an evaluation and/or score for the one or several artifacts.Type: ApplicationFiled: April 14, 2014Publication date: October 16, 2014Applicant: Pearson Education, Inc.Inventors: Miles T. Loring, Paul C. Grudnitski, Vishal Kapoor
-
Publication number: 20140137249Abstract: An anti-malware system dynamically loads and unloads additional malware detection signatures based on a collection of data sources that indicate what signatures are relevant to a host machine in its current environment. A signature selector component determines what relevant signatures should be loaded. The signature selector component uses a variety of data sources either individually, or in combination, to determine relevancy of the available malware detection signatures. The anti-malware system dynamically determines which of the available malware detection signatures and classes of signatures are relevant and should be provided to a machine based on available information. The malware detection signatures are obtained and loaded automatically from one or more sources when a threat becomes relevant. A program or application may be blocked from accessing files until the relevant malware detection signatures have been loaded onto the machine.Type: ApplicationFiled: November 15, 2012Publication date: May 15, 2014Applicant: MICROSOFT CORPORATIONInventors: Joseph Johnson, Vishal Kapoor, Michael S. Jarrett, Ronald L. Thompson
-
Patent number: 8612398Abstract: Systems, methods and apparatus for automatically identifying a version of a file that is expected to be present on a computer system and for automatically replacing a potentially corrupted copy of the file with a clean (or undamaged) copy of the expected version. Upon identifying a file on the computer system as being potentially corrupted, a clean file agent may perform an analysis based on the identity of the file and one or more other properties of the system to determine the version of the file that is expected to be present on the system. Once the expected version is identified, a clean replacement copy of the file may be obtained from a clean file repository by submitting a version identifier of the expected version. The version identifier may be a hash value, which may additionally be used to verify integrity of the clean copy.Type: GrantFiled: March 11, 2010Date of Patent: December 17, 2013Assignee: Microsoft CorporationInventors: Michael S. Jarrett, Vishal Kapoor, Mathew J. McCormack, Timothy D. Ebringer, Marc E. Seinfeld, Jeremy D. Croy, Alvin Loh
-
Publication number: 20130167235Abstract: An anti-malware program monitors the behavior of a system after a system restore to determine the likelihood of a hidden infection of malicious code still existing after the system restore. The anti-malware program observes the dynamic behavior of the system by monitoring conditions that are likely to signify the possibility of an infection thereby necessitating the need to initiate anti-malware detection. The anti-malware program may observe the restoration history, system settings, malware infection history, to determine the likelihood of an existing hidden infection after a system restore.Type: ApplicationFiled: December 22, 2011Publication date: June 27, 2013Applicant: Microsoft CorproationInventors: VISHAL KAPOOR, Jason Joyce, Gregory Nichols
-
Publication number: 20130160126Abstract: A system is described for remediating a malicious modern application installed on an end user device. In an embodiment, the system includes an antimalware program executing on the end user device that can detect and attempt to remediate the malicious modern application, an operating system executing on the end user device that is configured to interact with the antimalware program for the purpose of facilitating the establishment of a connection between the end user device and an application support system in response to determining that the antimalware program has detected and attempted to remediate the malicious modern application, and the application support system that can perform remediation operations beyond those that can be performed by the antimalware program.Type: ApplicationFiled: December 15, 2011Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Vishal Kapoor, Jason J. Joyce, Gregory W. Nichols, Joshua W. Dunn, Michael S. Jarrett, Adrian M. Marinescu, Marc E. Seinfeld, Axel Andrejs, Jayaraman Kalyana Sundaram
-
Publication number: 20120324579Abstract: Methods, systems, and computer program products are provided for recovering from false positives of malware detection. Malware signatures that are defective may be causing false positives during software scanning for malware. Such defective malware signatures may be detected (e.g., by user feedback, etc.) and revoked. Computers that are using the malware signatures to detect malware may be notified of the revoked signatures, and may be enabled to re-scan content identified as containing malware using malware signatures that do not include the revoked malware signatures. As such, if the content is determined during the re-scan to not be infected, the content may be re-enabled for usage on the computer (e.g., may be restored from quarantine storage).Type: ApplicationFiled: June 16, 2011Publication date: December 20, 2012Applicant: MICROSOFT CORPORATIONInventors: Michael Jarrett, Vishal Kapoor, Charles Turner, Joseph Johnson, Jason J. Joyce
-
Publication number: 20120297488Abstract: The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file.Type: ApplicationFiled: June 16, 2011Publication date: November 22, 2012Applicant: MICROSOFT CORPORATIONInventors: Vishal Kapoor, Jonathan Mark Keller, Ajith Kumar, Adrian M. Marinescu, Marc E. Seinfeld, Anil Francis Thomas, Michael Sean Jarrett, Joseph J. Johnson, Joseph L. Faulhaber
-
Publication number: 20120151582Abstract: The subject disclosure relates to antimalware scanning, and more particularly to offline antimalware scanning of a host environment via an alternate, known safe operating system. An offline scanning product obtains data previously written by the host environment online antimalware scanning tool, e.g., configuration data and antimalware signatures in shared data stores accessible to the offline and online products, and uses that data to perform the offline antimalware scan. The offline scanning product writes results information and any quarantined files to other shared data stores, whereby the online environment, when rebooted, has access to the information, such as for review and to upload telemetry information to an online service for analysis. Also described is offline replacement of operating system files that cannot be cleaned or removed when online.Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Applicant: MICROSOFT CORPORATIONInventors: Sterling M. Reasor, Kumi N. Hilwa, Eddy S. Hsia, Santanu Chakraborty, Joseph Leo Faulhaber, Vishal Kapoor, Michael Sean Jarrett, Charles Turner, Jeremy D. Croy
-
Publication number: 20120144489Abstract: The subject disclosure is directed towards protecting virtual machines on guest partitions from malware in a resource-efficient manner. Antimalware software is divided into lightweight agents that run on each malware-protected guest partition, a shared scanning and signature update mechanism, and a management component. Each agent provides the scanning mechanism with files to scan for malware, such as by running a script, and receives results from the scanning mechanism including possible remediation actions to perform. The management component provides the scanning mechanism with access to virtual machine services, such as to pause, resume, snapshot and rollback guest partitions as requested by the scanning mechanism.Type: ApplicationFiled: December 7, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Michael Sean Jarrett, Joseph Jared Johnson, Vishal Kapoor, Anil Francis Thomas, Eugene John Neystadt, Dennis Scott Batchelder
-
Publication number: 20110225128Abstract: Systems, methods and apparatus for automatically identifying a version of a file that is expected to be present on a computer system and for automatically replacing a potentially corrupted copy of the file with a clean (or undamaged) copy of the expected version. Upon identifying a file on the computer system as being potentially corrupted, a clean file agent may perform an analysis based on the identity of the file and one or more other properties of the system to determine the version of the file that is expected to be present on the system. Once the expected version is identified, a clean replacement copy of the file may be obtained from a clean file repository by submitting a version identifier of the expected version. The version identifier may be a hash value, which may additionally be used to verify integrity of the clean copy.Type: ApplicationFiled: March 11, 2010Publication date: September 15, 2011Applicant: Microsoft CorporationInventors: Michael S. Jarrett, Vishal Kapoor, Mathew J. McCormack, Timothy D. Ebringer, Marc E. Seinfeld, Jeremy D. Croy, Alvin Loh