54 patents
Utility
Multi-tiered approach to payload detection for incoming communications
28 Nov 23
A plurality of features associated with a message are determined.
Yu Zhou Lee, Micah J. Zirn, Umut Gultepe, Jeshua Alexis Bratman, Michael Douglas Kralka, Cheng-Lin Yeh, Dmitry Chechik, Sanjay Jeyakumar
Filed: 2 Jun 22
Utility
Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time
21 Nov 23
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 4 Nov 19
Utility
Multichannel threat detection for protecting against account compromise
17 Oct 23
Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication.
Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
Filed: 2 Mar 21
Utility
Detection and prevention of external fraud
18 Jul 23
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 29 Jul 22
Utility
Deriving and surfacing insights regarding security threats
18 Jul 23
Deriving and surfacing insights regarding security threats is disclosed.
Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
Filed: 12 Sep 22
Utility
Detection and Prevention of External Fraud
13 Jul 23
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 15 Mar 23
Utility
Url Rewriting
29 Jun 23
Selectively rewriting URLs is disclosed.
Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
Filed: 21 Dec 22
Utility
Deriving and surfacing insights regarding security threats
27 Jun 23
Deriving and surfacing insights regarding security threats is disclosed.
Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
Filed: 9 Dec 21
Utility
Multichannel threat detection for protecting against account compromise
30 May 23
Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed.
Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
Filed: 9 Jul 22
Utility
Adaptive Detection of Security Threats Through Retraining of Computer-implemented Models
9 Feb 23
Adapting detection of security threats, including by retraining computer-implemented models is disclosed.
Lei Xu, Jeshua Alexis Bratman
Filed: 22 Jul 22
Utility
Deriving and Surfacing Insights Regarding Security Threats
19 Jan 23
Deriving and surfacing insights regarding security threats is disclosed.
Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
Filed: 12 Sep 22
Utility
Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time
10 Jan 23
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 11 Oct 21
Utility
Federated Database for Establishing and Tracking Risk of Interactions with Third Parties
22 Dec 22
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 24 Aug 22
Utility
Discovering graymail through real-time analysis of incoming email
13 Dec 22
Techniques for identifying and processing graymail are disclosed.
Rami F. Habal, Kevin Lau, Sharan Dev Sankar, Yea So Jung, Dhruv Purushottam, Venkat Krishnamoorthi, Franklin X. Wang, Jeshua Alexis Bratman, Jocelyn Mikael Raphael Beauchesne, Abhijit Bagri, Sanjay Jeyakumar
Filed: 25 Oct 21
Utility
Multi-tiered Approach to Payload Detection for Incoming Communications
8 Dec 22
A plurality of features associated with a message are determined.
Yu Zhou Lee, Micah J. Zirn, Umut Gultepe, Jeshua Alexis Bratman, Michael Douglas Kralka, Cheng-Lin Yeh, Dmitry Chechik, Sanjay Jeyakumar
Filed: 2 Jun 22
Utility
Investigation of Threats Using Queryable Records of Behavior
8 Dec 22
Techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises are disclosed.
Jeremy Kao, Kai Jing Jiang, Sanjay Jeyakumar, Yea So Jung, Carlos Daniel Gasperi, Justin Anthony Young
Filed: 16 Aug 22
Utility
Detection and Prevention of External Fraud
17 Nov 22
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 29 Jul 22
Utility
Detection and prevention of external fraud
8 Nov 22
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 30 Sep 21
Utility
Multichannel Threat Detection for Protecting Against Account Compromise
27 Oct 22
Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed.
Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
Filed: 9 Jul 22
Utility
Estimating risk posed by interacting with third parties through analysis of emails addressed to employees of multiple enterprises
25 Oct 22
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 12 Aug 21