100 patents
Page 3 of 5
Utility
Systems and methods for discovering and alerting users of potentially hazardous messages
24 May 22
This disclosure generally revolves around providing users with advance warning that a message that they have received may be suspicious.
Benjamin Edwards, Alin Irimie, Greg Kras
Filed: 10 Jul 18
Utility
Systems and methods for AIDA campaign controller intelligent records
17 May 22
Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns for multiple users, where each of the simulated phishing campaigns use one or more models for communicating simulated phishing communications.
Stu Sjouwerman, Eric Sites
Filed: 28 Jun 21
Utility
Systems and methods for end-user security awareness training for calendar-based threats
17 May 22
Systems and methods are described for providing calendar-based simulated phishing attacks to users of an organization.
Perry Carpenter, Kathy Wattman, Morgan Flake, Detlev Weise, John Just, Kevin Mitnick
Filed: 19 May 21
Utility
System and methods for spoofed domain identification and user training
26 Apr 22
Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain.
Stu Sjouwerman, Alin Irimie, Greg Kras
Filed: 4 May 20
Utility
Systems and methods for using attribute data for system protection and security awareness training
5 Apr 22
The present disclosure describes a system for saving metadata on files and using attribute data files inside a computing system to enhance the ability to provide user interfaces based on actions associated with non-executable attachments like text and document files from untrusted emails, to block execution of potentially harmful executable object downloads and files based on geographic location, and to a create a prompt for users to decide whether to continue execution of potentially harmful executable object downloads and files.
Bret Lowry, Gauvin Repuspolo
Filed: 17 Apr 20
Utility
Systems and methods for determining a job score from a job title
5 Apr 22
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a job score for a user based on the user's job title.
Eric Wayne Sites, Ryan Scott Davis, Daniel James DeCola
Filed: 22 Apr 21
Utility
Systems and methods for determination of level of security to apply to a group before display of user data
5 Apr 22
Systems and methods are described for using secured groups for simulated phishing campaigns to obfuscate data for levels of privacy based on protected criteria classes.
Greg Kras, Chris Cline
Filed: 28 Oct 21
Utility
Systems and methods for situational localization of AIDA
5 Apr 22
The present disclosure describes systems and methods for using for a simulated phishing campaign, information about one or more situations of a user determined from an electronic calendar of the user.
Greg Kras
Filed: 3 Apr 20
Utility
Systems and methods for providing configurable responses to threat identification
8 Mar 22
Systems and methods are described for providing customized message content to be displayed to a user of an email client, responsive to the user selecting, via a plug-in or agent of the email client, to report an email as a potential phishing email.
Greg Kras, Adam Alessandrini
Filed: 5 Feb 21
Utility
Systems and methods for providing user interfaces based on actions associated with untrusted emails
1 Feb 22
The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails.
Bret Lowry, Gauvin Repuspolo, Greg Kras
Filed: 16 Apr 20
Utility
Time based triggering of dynamic templates
28 Dec 21
Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user.
Greg Kras
Filed: 1 May 20
Utility
Systems and methods for AIDA based grouping
21 Dec 21
The present disclosure describes systems and methods for dynamically creating groups of users based on attributes for simulated phishing campaign.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 11 Jan 21
Utility
Systems and methods for AIDA based role models
5 Oct 21
The present disclosure describes systems and methods for using a model for a predetermined role for simulated phishing campaigns.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 27 Oct 20
Utility
Using smart groups for computer-based security awareness training systems
14 Sep 21
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they care about.
Greg Kras, Alin Irimie
Filed: 19 Oct 20
Utility
Systems and methods for use of address fields in a simulated phishing attack
31 Aug 21
Systems and methods are disclosed for creating simulated phishing attack messages that have characteristics which make them appear genuine, while also having characteristics that a user should recognize as being false.
Jasmine Rodriguez, Daniel Cormier
Filed: 28 Apr 20
Utility
System and methods for efficient combining of malware detection rules
31 Aug 21
System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
Filed: 11 Aug 20
Utility
Systems and methods for determining individual and group risk scores
31 Aug 21
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 14 Dec 20
Utility
Systems and methods for simulated phishing attacks involving message threads
31 Aug 21
Systems and methods are disclosed for simulating a phishing attack involving an email thread.
Greg Kras
Filed: 14 Aug 20
Utility
Systems and methods for an artificial intelligence driven agent
27 Jul 21
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 30 Nov 20
Utility
Systems and methods for performing simulated phishing attacks using social engineering indicators
20 Jul 21
Systems and methods are provided for performing simulated phishing attacks using social engineering indicators.
Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
Filed: 23 Jan 20