54 patents
Page 3 of 3
Utility
Retrospective Learning of Communication Patterns by Machine Learning Models for Discovering Abnormal Behavior
21 Oct 21
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 28 Jun 21
Utility
Programmatic Discovery, Retrieval, and Analysis of Communications to Identify Abnormal Communication Activity
23 Sep 21
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 7 Jun 21
Utility
Investigation of Threats Using Queryable Records of Behavior
16 Sep 21
Introduced here are computer programs and computer-implemented techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises.
Jeremy Kao, Kai Jing Jiang, Sanjay Jeyakumar, Yea So Jung, Carlos Daniel Gasperi, Justin Anthony Young
Filed: 12 Mar 21
Utility
Abuse Mailbox for Facilitating Discovery, Investigation, and Analysis of Email-based Threats
2 Sep 21
Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner.
Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
Filed: 22 Jan 21
Utility
Multichannel Threat Detection for Protecting Against Account Compromise
2 Sep 21
Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication.
Rami Faris HABAL, Abhijit BAGRI, Yea So JUNG, Fang Shuo DENG, Jeremy KAO, Jeshua Alexis BRATMAN, Umut GULTEPE, Hariank Sagar Muthakana
Filed: 2 Mar 21
Utility
Federated Database for Establishing and Tracking Risk of Interactions with Third Parties
2 Sep 21
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 25 Feb 21
Utility
Discovering Email Account Compromise Through Assessments of Digital Activities
26 Aug 21
Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise.
Dmitry Chechik, Umut Gultepe, Raphael Kargon, Jeshua Alexis Bratman, Cheng-Lin Yeh, Sanny Xiao Lang Liao, Erin Elisabeth Edkins Ludert, Sanjay Jeyakumar
Filed: 10 Nov 20
Utility
Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior
29 Jun 21
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 13 Jul 20
Utility
Programmatic discovery, retrieval, and analysis of communications to identify abnormal communication activity
8 Jun 21
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 13 Jul 20
Utility
Discovering email account compromise through assessments of digital activities
2 Feb 21
Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise.
Dmitry Chechik, Umut Gultepe, Raphael Kargon, Jeshua Alexis Bratman, Cheng-Lin Yeh, Sanny Xiao Lang Liao, Erin Elisabeth Edkins Ludert, Sanjay Jeyakumar
Filed: 29 May 20
Utility
Retrospective Learning of Communication Patterns by Machine Learning Models for Discovering Abnormal Behavior
16 Dec 20
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 12 Jul 20
Utility
Programmatic Discovery, Retrieval, and Analysis of Communications to Identify Abnormal Communication Activity
9 Dec 20
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 12 Jul 20
Utility
Multistage Analysis of Emails to Identify Security Threats
28 Oct 20
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 12 Jul 20
Utility
Threat Detection Platforms for Detecting, Characterizing, and Remediating Email-based Threats In Real Time
24 Jun 20
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 3 Nov 19