23 patents
Utility
Multi-tiered approach to payload detection for incoming communications
28 Nov 23
A plurality of features associated with a message are determined.
Yu Zhou Lee, Micah J. Zirn, Umut Gultepe, Jeshua Alexis Bratman, Michael Douglas Kralka, Cheng-Lin Yeh, Dmitry Chechik, Sanjay Jeyakumar
Filed: 2 Jun 22
Utility
Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time
21 Nov 23
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 4 Nov 19
Utility
Multichannel threat detection for protecting against account compromise
17 Oct 23
Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication.
Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
Filed: 2 Mar 21
Utility
Detection and prevention of external fraud
18 Jul 23
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 29 Jul 22
Utility
Deriving and surfacing insights regarding security threats
18 Jul 23
Deriving and surfacing insights regarding security threats is disclosed.
Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
Filed: 12 Sep 22
Utility
Deriving and surfacing insights regarding security threats
27 Jun 23
Deriving and surfacing insights regarding security threats is disclosed.
Yu Zhou Lee, Kai Jiang, Su Li Debbie Tan, Geng Sng, Cheng-Lin Yeh, Lawrence Stockton Moore, Sanny Xiao Lang Liao, Joey Esteban Cerquera, Jeshua Alexis Bratman, Sanjay Jeyakumar, Nishant Bhalchandra Karandikar
Filed: 9 Dec 21
Utility
Multichannel threat detection for protecting against account compromise
30 May 23
Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed.
Rami Faris Habal, Abhijit Bagri, Yea So Jung, Fang Shuo Deng, Jeremy Kao, Jeshua Alexis Bratman, Umut Gultepe, Hariank Sagar Muthakana
Filed: 9 Jul 22
Utility
Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time
10 Jan 23
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan Reiser, Sanny Xiao Lang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 11 Oct 21
Utility
Discovering graymail through real-time analysis of incoming email
13 Dec 22
Techniques for identifying and processing graymail are disclosed.
Rami F. Habal, Kevin Lau, Sharan Dev Sankar, Yea So Jung, Dhruv Purushottam, Venkat Krishnamoorthi, Franklin X. Wang, Jeshua Alexis Bratman, Jocelyn Mikael Raphael Beauchesne, Abhijit Bagri, Sanjay Jeyakumar
Filed: 25 Oct 21
Utility
Detection and prevention of external fraud
8 Nov 22
Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 30 Sep 21
Utility
Estimating risk posed by interacting with third parties through analysis of emails addressed to employees of multiple enterprises
25 Oct 22
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 12 Aug 21
Utility
Federated database for establishing and tracking risk of interactions with third parties
18 Oct 22
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 25 Feb 21
Utility
Approaches to creating, managing, and applying a federated database to establish risk posed by third parties
18 Oct 22
Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors.
Jeshua Alexis Bratman, Yu Zhou Lee, Lawrence Stockton Moore, Rami Faris Habal, Lei Xu
Filed: 12 Aug 21
Utility
Discovering email account compromise through assessments of digital activities
11 Oct 22
Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise.
Dmitry Chechik, Umut Gultepe, Raphael Kargon, Jeshua Alexis Bratman, Cheng-Lin Yeh, Sanny Xiao Lang Liao, Erin Elisabeth Edkins Ludert, Sanjay Jeyakumar, Hariank Muthakana
Filed: 10 Nov 20
Utility
Detection and prevention of external fraud
11 Oct 22
Introduced here are computer programs and computer-implemented techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise.
Yu Zhou Lee, Lawrence Stockton Moore, Jeshua Alexis Bratman, Lei Xu, Sanjay Jeyakumar
Filed: 23 Apr 21
Utility
Investigation of threats using queryable records of behavior
20 Sep 22
Introduced here are computer programs and computer-implemented techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises.
Jeremy Kao, Kai Jing Jiang, Sanjay Jeyakumar, Yea So Jung, Carlos Daniel Gasperi, Justin Anthony Young
Filed: 12 Mar 21
Utility
Multistage analysis of emails to identify security threats
30 Aug 22
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 13 Jul 20
Utility
Multistage analysis of emails to identify security threats
5 Jul 22
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 13 Jul 20
Utility
Multistage analysis of emails to identify security threats
17 May 22
Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake.
Sanjay Jeyakumar, Jeshua Alexis Bratman, Dmitry Chechik, Abhijit Bagri, Evan James Reiser, Sanny Xiao Yang Liao, Yu Zhou Lee, Carlos Daniel Gasperi, Kevin Lau, Kai Jing Jiang, Su Li Debbie Tan, Jeremy Kao, Cheng-Lin Yeh
Filed: 13 Jul 20
Utility
Abuse mailbox for facilitating discovery, investigation, and analysis of email-based threats
15 Feb 22
Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner.
Evan James Reiser, Jeremy Kao, Cheng-Lin Yeh, Yea So Jung, Kai Jing Jiang, Abhijit Bagri, Su Li Debbie Tan, Venkatram Krishnamoorthi, Fang Shuo Deng
Filed: 22 Jan 21