31 patents
Utility
Detection and Prevention of External Fraud
13 Jul 23
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 15 Mar 23
Utility
Url Rewriting
29 Jun 23
Selectively rewriting URLs is disclosed.
Yea So Jung, Su Li Debbie Tan, Kai Jing Jiang, Fang Shuo Deng, Yu Zhou Lee, Rami F. Habal, Oz Wasserman, Sanjay Jeyakumar
Filed: 21 Dec 22
Utility
Adaptive Detection of Security Threats Through Retraining of Computer-implemented Models
9 Feb 23
Adapting detection of security threats, including by retraining computer-implemented models is disclosed.
Lei Xu, Jeshua Alexis Bratman
Filed: 22 Jul 22
Utility
Deriving and Surfacing Insights Regarding Security Threats
19 Jan 23
Deriving and surfacing insights regarding security threats is disclosed.
Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
Filed: 12 Sep 22
Utility
Federated Database for Establishing and Tracking Risk of Interactions with Third Parties
22 Dec 22
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 24 Aug 22
Utility
Multi-tiered Approach to Payload Detection for Incoming Communications
8 Dec 22
A plurality of features associated with a message are determined.
Yu Zhou Lee, Micah J. Zirn, Umut Gultepe, Jeshua Alexis Bratman, Michael Douglas Kralka, Cheng-Lin Yeh, Dmitry Chechik, Sanjay Jeyakumar
Filed: 2 Jun 22
Utility
Investigation of Threats Using Queryable Records of Behavior
8 Dec 22
Techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises are disclosed.
Jeremy Kao, Kai Jing Jiang, Sanjay Jeyakumar, Yea So Jung, Carlos Daniel Gasperi, Justin Anthony Young
Filed: 16 Aug 22
Utility
Detection and Prevention of External Fraud
17 Nov 22
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 29 Jul 22
Utility
Multichannel Threat Detection for Protecting Against Account Compromise
27 Oct 22
Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed.
Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
Filed: 9 Jul 22
Utility
Discovering Email Account Compromise Through Assessments of Digital Activities
8 Sep 22
Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise.
Dmitry Chechik, Umut Gultepe, Raphael Kargon, Jeshua Alexis Bratman, Cheng-Lin Yeh, Sanny Xiao Lang Liao, Erin Elisabeth Edkins Ludert, Sanjay Jeyakumar, Hariank Sagar Muthakana
Filed: 23 May 22
Utility
Multistage Analysis of Emails to Identify Security Threats
1 Sep 22
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 22 Feb 22
Utility
Discovering Graymail Through Real-time Analysis of Incoming Email
25 Aug 22
Techniques for identifying and processing graymail are disclosed.
Rami F. Habal, Kevin Lau, Sharan Dev Sankar, Yea So Jung, Dhruv Purushottam, Venkat Krishnamoorthi, Franklin X. Wang, Jeshua Alexis Bratman, Jocelyn Mikael Raphael Beauchesne, Abhijit Bagri, Sanjay Jeyakumar
Filed: 12 May 22
Utility
Abuse Mailbox for Facilitating Discovery, Investigation, and Analysis of Email-based Threats
11 Aug 22
Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner.
Evan Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Kishnamoorthi, Feng Shuo Deng
Filed: 14 Dec 21
Utility
Deriving and Surfacing Insights Regarding Security Threats
16 Jun 22
Deriving and surfacing insights regarding security threats is disclosed.
Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
Filed: 9 Dec 21
Utility
Discovering Graymail Through Real-time Analysis of Incoming Email
28 Apr 22
Techniques for identifying and processing graymail are disclosed.
Rami Faris Habal, Kevin Lau, Sharan Dev Sankar, Yea So Jung, Dhruv Purushottam, Venkat Krishnamoorthi, Franklin X. Wang, Jeshua Alexis Bratman, Jocelyn Mikael Raphael Beauchesne, Abhijit Bagri, Sanjay Jayakumar
Filed: 25 Oct 21
Utility
Threat Detection Platforms for Detecting, Characterizing, and Remediating Email-based Threats In Real Time
27 Jan 22
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 11 Oct 21
Utility
Detection and Prevention of External Fraud
20 Jan 22
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 30 Sep 21
Utility
Estimating Risk Posed by Interacting with Third Parties Through Analysis of Emails Addressed to Employees of Multiple Enterprises
2 Dec 21
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 12 Aug 21
Utility
Approaches to Creating, Managing, and Applying a Federated Database to Establish Risk Posed by Third Parties
2 Dec 21
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 12 Aug 21
Utility
Detection and Prevention of External Fraud
28 Oct 21
Introduced here are computer programs and computer-implemented techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 23 Apr 21