206 patents
Page 3 of 11
Utility
Using a Machine Learning System to Process a Corpus of Documents Associated With a User to Determine a User-Specific and/or Process-Specific Consequence Index
6 Apr 23
Aspects of the disclosure relate to using a machine learning system to process a corpus of documents associated with a user to determine a user-specific consequence index.
Daniel Wallace Rapp, Brian Sanford Jones, Spencer Bror Koehler
Filed: 17 Nov 22
Utility
Message Management Platform for Performing Impersonation Analysis & Detection
6 Apr 23
Aspects of the disclosure relate to detecting impersonation in email body content using machine learning.
Harold Nguyen
Filed: 8 Dec 22
Utility
Spammy app detection systems and methods
28 Mar 23
A spammy app detection system may search a database for any new social media application discovered during a recent time period.
Harold Nguyen, Ali Mesdaq, Daniel Oshiro Nadir, Anthony Lawrence Dorie
Filed: 28 Sep 20
Utility
Interactive Email Warning Tags
23 Mar 23
Aspects of the disclosure relate to providing a flexible and automated system for automatically detecting when emails include harmful content, flagging the emails, providing interactive reporting functionality, and providing follow-up enforcement actions to protect users.
Alan James Himler, Mark Wuslich, Sharankumar Hiremath
Filed: 21 Sep 21
Utility
System and methods for reducing the cybersecurity risk of an organization by verifying compliance status of vendors, products and services
21 Mar 23
A system and methods for determining the degree to which a vendor, supplier, or company's compliance or lack of compliance with a specific regulation or requirement contributes to, or could contribute to, the cybersecurity risk of an organization whose employees use that company's products or services.
Shmuel Amar
Filed: 12 Aug 20
Utility
Uniform resource locator classifier and visual comparison platform for malicious site detection
21 Mar 23
Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning.
Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dalian Quass
Filed: 26 Mar 20
Utility
Identifying Legitimate Websites to Remove False Positives from Domain Discovery Analysis
16 Mar 23
Aspects of the disclosure relate to identifying legitimate websites and removing false positives from domain discovery analysis.
Hung-Jen Chang, Gaurav Mitesh Dalal, Ali Mesdaq
Filed: 22 Nov 22
Utility
System and method for identifying cyberthreats from unstructured social media content
21 Feb 23
A cyberthreat detection system queries a content database for unstructured content that contains a set of keywords, clusters the unstructured content into clusters based on topics, and determines a cybersecurity cluster utilizing a list of vetted cybersecurity phrases.
Daniel Clark Salo
Filed: 18 Mar 20
Utility
Visual domain detection systems and methods
14 Feb 23
Disclosed is an effective domain name defense solution in which a domain name string may be provided to or obtained by a computer embodying a visual domain analyzer.
Gaurav Mitesh Dalal, Ali Mesdaq, Sharon Huffner, Harold Nguyen
Filed: 4 May 20
Utility
Electronic message processing systems and methods
14 Feb 23
A message-hold decision maker system used with an electronic mail processing system that processes electronic messages for a protected computer network improves the electronic mail processing system's performance by increasing the throughput performance of the system.
Alina V. Khayms, Gregory Lee Wittel
Filed: 31 Mar 20
Utility
IP address and routing schemes for overlay network
7 Feb 23
A communication system includes multiple Point-of-Presence (POP) interfaces distributed in a Wide-Area Network (WAN), and one or more processors coupled to the POP interfaces.
Etay Bogner, Eduardo Warszawski
Filed: 9 Mar 21
Utility
Detecting, classifying, and enforcing policies on social networking activity
31 Jan 23
Technology is disclosed for detecting, classifying, and/or enforcing policies on social networking activity.
Richard Banks Sutton, Anthony Lawrence Dorie, Wenchang Yan, Devin Hugh Redmond, Raymond Kruck, Daniel Oshiro Nadir
Filed: 14 Jun 21
Utility
Dynamically Initiating and Managing Automated Spear Phishing in Enterprise Computing Environments
19 Jan 23
Aspects of the disclosure relate to dynamic and automated spear phishing management.
Nathan James Grealish
Filed: 26 Sep 22
Utility
Message management platform for performing impersonation analysis and detection
10 Jan 23
Aspects of the disclosure relate to detecting impersonation in email body content using machine learning.
Harold Nguyen
Filed: 27 Nov 19
Utility
Dynamically Controlling Access to Linked Content in Electronic Communications
5 Jan 23
Aspects of the disclosure relate to dynamically controlling access to linked content in electronic communications.
Conor Brian Hayes, Michael Edward Jones, Alina V. Khayms, Kenny Lee, David Jonathan Melnick, Adrian Knox Roston
Filed: 30 Aug 22
Utility
System and Method of Protecting Client Computers
29 Dec 22
A threat response platform to act as a bridge between non-inline security programs and inline security programs.
Theron D. Tock, Michael P. Horn
Filed: 7 Sep 22
Utility
Using a machine learning system to process a corpus of documents associated with a user to determine a user-specific and/or process-specific consequence index
27 Dec 22
Aspects of the disclosure relate to using a machine learning system to process a corpus of documents associated with a user to determine a user-specific consequence index.
Daniel Wallace Rapp, Brian Sanford Jones, Spencer Bror Koehler
Filed: 13 Apr 20
Utility
Identifying legitimate websites to remove false positives from domain discovery analysis
27 Dec 22
Aspects of the disclosure relate to identifying legitimate websites and removing false positives from domain discovery analysis.
Hung-Jen Chang, Gaurav Mitesh Dalal, Ali Mesdaq
Filed: 18 Dec 19
Utility
Systems and methods for security analysis of applications on user mobile devices while maintaining user application privacy
27 Dec 22
Systems and methods for analyzing applications (“apps”) on a mobile device for security risks for a company while maintaining the mobile device owner's privacy and confidentiality concerning the applications.
David Alexander Jevans
Filed: 4 May 21
Utility
Systems and methods for promissory image classification
13 Dec 22
Systems, methods and products for classifying images according to a visual concept where, in one embodiment, a system includes an object detector and a visual concept classifier, the object detector being configured to detect objects depicted in an image and generate a corresponding object data set identifying the objects and containing information associated with each of the objects, the visual concept classifier being configured to examine the object data set generated by the object detector, detect combinations of the information in the object data set that are high-precision indicators of the designated visual concept being contained in the image, generate a classification for the object data set with respect to the designated visual concept, and associate the classification with the image, wherein the classification identifies the image as either containing the designated visual concept or not containing the designated visual concept.
Daniel Clark Salo
Filed: 20 Mar 20