Abnormal Security Corporation

United States of America

Back to Profile

1-69 of 69 for Abnormal Security Corporation Sort by
Query
Aggregations
IP Type
        Patent 49
        Trademark 20
Jurisdiction
        United States 50
        World 13
        Canada 6
Date
2024 October 4
2024 13
2023 4
2022 17
2021 23
See more
IPC Class
H04L 9/40 - Network security protocols 28
H04L 29/06 - Communication control; Communication processing characterised by a protocol 14
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking 12
G06Q 10/10 - Office automation; Time management 10
G06F 21/55 - Detecting local intrusion or implementing counter-measures 9
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 20
09 - Scientific and electric apparatus and instruments 1
38 - Telecommunications services 1
Status
Pending 22
Registered / In Force 47

1.

INGESTING, STANDARDIZING, AND ANALYZING DIGITAL ACTIVITY INFORMATION FOR DETECTING THREATS

      
Application Number US2024026105
Publication Number 2024/226684
Status In Force
Filing Date 2024-04-24
Publication Date 2024-10-31
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Jeyakumar, Sanjay
  • Reiser, Evan
  • Bagri, Abhijit
  • Perez, Maritza
  • Edupuganti, Vineet
  • Gao, Yingkai
  • Gultepe, Umut
  • Yeh, Cheng-Lin
  • Philip, Mark
  • Khot, Tejas
  • Dawes, Thomas
  • Mahadik, Sanish
  • Snider, Benjamin
  • Li, Cheng
  • Balachundhar, Nirmal
  • Vellal, Adithya
  • Sonnabend, Lucas

Abstract

Introduced here is a network-accessible platform (or simply "platform") that is designed to monitor digital activities that are performed across different services to ascertain, in real time, threats to the security of an enterprise. In order to surface insights into the threats posed to an enterprise, the platform can apply machine learning models to data that is representative of digital activities performed on different services with respective accounts. Each model may be trained to understand what constitutes normal behavior for a corresponding employee with respect to a single service or multiple services. Not only can these models be autonomously trained for the employees of the enterprise, but they can also be autonomously applied to detect, characterize, and catalog those digital activities that are indicative of a threat.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 43/00 - Arrangements for monitoring or testing data switching networks
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

2.

APPROACHES TO LEARNING BEHAVIORAL NORMS THROUGH AN ANALYSIS OF DIGITAL ACTIVITIES PERFORMED ACROSS DIFFERENT SERVICES AND USING THE SAME FOR DETECTING THREATS

      
Application Number 18645172
Status Pending
Filing Date 2024-04-24
First Publication Date 2024-10-24
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Reiser, Evan
  • Bagri, Abhijit
  • Perez, Maritza
  • Edupuganti, Vineet
  • Gao, Yingkai
  • Gultepe, Umut
  • Yeh, Cheng-Lin
  • Philip, Mark
  • Khot, Tejas
  • Dawes, Thomas
  • Mahadik, Sanish
  • Snider, Benjamin
  • Li, Cheng
  • Balachundhar, Nirmal
  • Vellal, Adithya
  • Sonnabend, Lucas

Abstract

Introduced here is a network-accessible platform (or simply “platform”) that is designed to monitor digital activities that are performed across different services to ascertain, in real time, threats to the security of an enterprise. In order to surface insights into the threats posed to an enterprise, the platform can apply machine learning models to data that is representative of digital activities performed on different services with respective accounts. Each model may be trained to understand what constitutes normal behavior for a corresponding employee with respect to a single service or multiple services. Not only can these models be autonomously trained for the employees of the enterprise, but they can also be autonomously applied to detect, characterize, and catalog those digital activities that are indicative of a threat.

IPC Classes  ?

3.

APPROACHES TO INGESTING INFORMATION REGARDING DIGITAL ACTIVITIES PERFORMED ACROSS DIFFERENT SERVICES AND USING THE SAME FOR DETECTING THREATS

      
Application Number 18645164
Status Pending
Filing Date 2024-04-24
First Publication Date 2024-10-24
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Reiser, Evan
  • Bagri, Abhijit
  • Perez, Maritza
  • Edupuganti, Vineet
  • Gao, Yingkai
  • Gultepe, Umut
  • Yeh, Cheng-Lin
  • Philip, Mark
  • Khot, Tejas
  • Dawes, Thomas
  • Mahadik, Sanish
  • Snider, Benjamin
  • Li, Cheng
  • Balachundhar, Nirmal
  • Vellal, Adithya
  • Sonnabend, Lucas

Abstract

Introduced here is a network-accessible platform (or simply “platform”) that is designed to monitor digital activities that are performed across different services to ascertain, in real time, threats to the security of an enterprise. In order to surface insights into the threats posed to an enterprise, the platform can apply machine learning models to data that is representative of digital activities performed on different services with respective accounts. Each model may be trained to understand what constitutes normal behavior for a corresponding employee with respect to a single service or multiple services. Not only can these models be autonomously trained for the employees of the enterprise, but they can also be autonomously applied to detect, characterize, and catalog those digital activities that are indicative of a threat.

IPC Classes  ?

4.

APPROACHES TO DOCUMENTING AND VISUALIZING INDICATIONS OF RISK DISCOVERED THROUGH AN ANALYSIS OF DIGITAL ACTIVITIES PERFORMED ACROSS DIFFERENT SERVICES AND USING THE SAME FOR DETECTING THREATS

      
Application Number 18645183
Status Pending
Filing Date 2024-04-24
First Publication Date 2024-10-24
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Reiser, Evan
  • Bagri, Abhijit
  • Perez, Maritza
  • Edupuganti, Vineet
  • Gao, Yingkai
  • Gultepe, Umut
  • Yeh, Cheng-Lin
  • Philip, Mark
  • Khot, Tejas
  • Dawes, Thomas
  • Mahadik, Sanish
  • Snider, Benjamin
  • Li, Cheng
  • Balachundhar, Nirmal
  • Vellal, Adithya
  • Sonnabend, Lucas

Abstract

Introduced here is a network-accessible platform (or simply “platform”) that is designed to monitor digital activities that are performed across different services to ascertain, in real time, threats to the security of an enterprise. In order to surface insights into the threats posed to an enterprise, the platform can apply machine learning models to data that is representative of digital activities performed on different services with respective accounts. Each model may be trained to understand what constitutes normal behavior for a corresponding employee with respect to a single service or multiple services. Not only can these models be autonomously trained for the employees of the enterprise, but they can also be autonomously applied to detect, characterize, and catalog those digital activities that are indicative of a threat.

IPC Classes  ?

  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities
  • H04L 9/40 - Network security protocols

5.

APPROACHES TO ASCERTAINING BEHAVIORAL DEVIATIONS BASED ON AN ANALYSIS OF MULTIPLE DIGITAL ACTIVITIES PERFORMED ON THE SAME SERVICE OR ACROSS DIFFERENT SERVICES TO DETECT THREATS

      
Application Number 18645265
Status Pending
Filing Date 2024-04-24
First Publication Date 2024-10-24
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Reiser, Evan
  • Bagri, Abhijit
  • Perez, Maritza
  • Edupuganti, Vineet
  • Gao, Yingkai
  • Gultepe, Umut
  • Yeh, Cheng-Lin
  • Philip, Mark
  • Khot, Tejas
  • Dawes, Thomas
  • Mahadik, Sanish
  • Snider, Benjamin
  • Li, Cheng
  • Balachundhar, Nirmal
  • Vellal, Adithya
  • Sonnabend, Lucas

Abstract

Introduced here is a network-accessible platform (or simply “platform”) that is designed to monitor digital activities that are performed across different services to ascertain, in real time, threats to the security of an enterprise. In order to surface insights into the threats posed to an enterprise, the platform can apply machine learning models to data that is representative of digital activities performed on different services with respective accounts. Each model may be trained to understand what constitutes normal behavior for a corresponding employee with respect to a single service or multiple services. Not only can these models be autonomously trained for the employees of the enterprise, but they can also be autonomously applied to detect, characterize, and catalog those digital activities that are indicative of a threat.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities

6.

MULTISTAGE ANALYSIS OF EMAILS TO IDENTIFY SECURITY THREATS

      
Application Number 18617282
Status Pending
Filing Date 2024-03-26
First Publication Date 2024-08-29
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan
  • Liao, Sanny Xiao Lang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Access to emails delivered to an employee of an enterprise is received. An incoming email addressed to the employee is acquired. A primary attribute is extracted from the incoming email by parsing at least one of: (1) content of the incoming email or (2) metadata associated with the incoming email. It is determined whether the incoming email deviates from past email activity, at least in part by determining, as a secondary attribute, a mismatch between a previous value for the primary attribute and a current value for the primary attribute, using a communication profile associated with the employee, and providing a measured deviation to at least one machine learning model.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06N 20/00 - Machine learning
  • G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]

7.

ADAPTIVE DETECTION OF SECURITY THREATS THROUGH TRAINING OF COMPUTER-IMPLEMENTED MODELS

      
Application Number 18620303
Status Pending
Filing Date 2024-03-28
First Publication Date 2024-08-29
Owner Abnormal Security Corporation (USA)
Inventor
  • Xu, Lei
  • Bratman, Jeshua Alexis

Abstract

A generated training set comprising a plurality of training samples is received. The generated training set includes at least one training sample constructed using one or more linguistic hints, comprising at least one keyword of phrase, about an attack for which malicious textual communications associated with the attack, when processed by a natural language processing model could be classified as benign textual communications before being trained using the generated training set. The natural language processing model is trained at least in part by using the generated training set, wherein the trained natural language processing model is configured to determine a likelihood that a received communication transmitted by a sender to a recipient poses a risk.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

8.

ABUSE MAILBOX FOR FACILITATING DISCOVERY, INVESTIGATION, AND ANALYSIS OF EMAIL-BASED THREATS

      
Application Number 18443055
Status Pending
Filing Date 2024-02-15
First Publication Date 2024-06-06
Owner Abnormal Security Corporation (USA)
Inventor
  • Reiser, Evan
  • Kao, Jeremy
  • Yeh, Cheng-Lin
  • Jung, Yea So
  • Jiang, Kai Jing
  • Bagri, Abhijit
  • Tan, Su Li Debbie
  • Krishnamoorthi, Venkat
  • Deng, Fang Shuo

Abstract

It is determined that a first email is present in a mailbox where emails deemed suspicious are placed for analysis. In response to determining that the first email is present in the mailbox, it is determined whether the first email is representative of a threat to an enterprise based at least in part by applying a trained model to the first email. In response to determining that the first email represents a threat to the enterprise, a record of the threat is generated by populating a data structure with information related to the first email. The data structure is applied to inboxes of a plurality of the employees to determine whether the first email is part of a campaign. In response to determining that the first email is part of a campaign, a filter associated with the data structure is applied to inbound emails addressed to employees of the enterprise.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
  • G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]

9.

THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIME

      
Application Number 18373134
Status Pending
Filing Date 2023-09-26
First Publication Date 2024-05-23
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan
  • Liao, Sanny Xiao Lang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

A message addressed to a user is received. A first model is applied to the message to produce a first output indicative of whether the message is representative of a non-malicious message. The first model is trained using past messages that have been verified as non-malicious messages. It is determined, based on the first output, that the message is potentially a malicious message. Responsive to determining that the message is potentially a malicious email based on the first output, apply a second model to the message to produce a second output indicative of whether the message is representative of a given type of attack. The second model is one of a plurality of models. At least one model included in the plurality of models is associated with characterizing a goal of the malicious message. An action is performed with respect to the message based on the second output.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

10.

AI-NATIVE PLATFORM FOR HUMAN BEHAVIOR SECURITY

      
Serial Number 98521344
Status Pending
Filing Date 2024-04-26
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing online non-downloadable software that utilizes machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications

11.

ABNORMAL HUMAN BEHAVIOR AI PLATFORM

      
Serial Number 98521348
Status Pending
Filing Date 2024-04-26
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing online non-downloadable software that utilizes machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications

12.

GO AHEAD, BE HUMAN.

      
Serial Number 98521329
Status Pending
Filing Date 2024-04-26
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing online non-downloadable software that utilizes machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications

13.

THREATINTELBASE

      
Serial Number 98521349
Status Pending
Filing Date 2024-04-26
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services for evaluating communications, including email and messages, and relational items to identify security threats and then monitor those security threats on an ongoing basis; Computer services for recording behaviors of Software-as-a-Service (SaaS) accounts for security purposes, namely, identifying and examining digital activities performed with SaaS accounts to identify security threats; Computer services for generating a federated collection of security threats posed to a company; Computer services for identifying and cataloging behaviors of SaaS accounts to discover patterns of unusual behavior; Computer services for generating a federated list of digital accounts for which behavior is unusual to prevent fraud; Computer services for creating, populating, and managing lists of SaaS accounts determined to be security threats due to involvement in past digital activities; Computer services for analyzing digital activities performed with SaaS accounts to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy

14.

DETECTION AND PREVENTION OF EXTERNAL FRAUD

      
Application Number 18122046
Status Pending
Filing Date 2023-03-15
First Publication Date 2023-07-13
Owner Abnormal Security Corporation (USA)
Inventor
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Bratman, Jeshua Alexis
  • Xu, Lei
  • Jeyakumar, Sanjay

Abstract

Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed. In one example, a threat detection platform determines the likelihood that an incoming email is indicative of external fraud based on the context and content of the incoming email. To understand the risk posed by an incoming email, the threat detection platform may seek to determine not only whether the sender normally communicates with the recipient, but also whether the topic is one normally discussed by the sender and recipient. In this way, the threat detection platform can establish whether the incoming email deviates from past emails exchanged between the sender and recipient.

IPC Classes  ?

15.

URL rewriting

      
Application Number 18086548
Grant Number 11943257
Status In Force
Filing Date 2022-12-21
First Publication Date 2023-06-29
Grant Date 2024-03-26
Owner Abnormal Security Corporation (USA)
Inventor
  • Jung, Yea So
  • Tan, Su Li Debbie
  • Jiang, Kai Jing
  • Deng, Fang Shuo
  • Lee, Yu Zhou
  • Habal, Rami F.
  • Wasserman, Oz
  • Jeyakumar, Sanjay

Abstract

Selectively rewriting URLs is disclosed. An indication is received that a message has arrived at a user message box. A determination is made that the message includes a first link to a first resource. The first link is analyzed to determine whether the first link is classified as a non-rewrite link. In response to determining that the first link is not classified as a non-rewrite link, a first replacement link is generated for the first link.

IPC Classes  ?

16.

Adaptive detection of security threats through retraining of computer-implemented models

      
Application Number 17871765
Grant Number 11971985
Status In Force
Filing Date 2022-07-22
First Publication Date 2023-02-09
Grant Date 2024-04-30
Owner Abnormal Security Corporation (USA)
Inventor
  • Xu, Lei
  • Bratman, Jeshua Alexis

Abstract

Adapting detection of security threats, including by retraining computer-implemented models is disclosed. An indication is received that a natural language processing model should be retrained. A list of training samples is generated that includes at least one synthetic training sample. The natural language processing model is retrained at least in part by using the set of generated training samples. The retrained natural language processing model is used to determine a likelihood that a message poses a risk.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

17.

Deriving and surfacing insights regarding security threats

      
Application Number 17942931
Grant Number 11704406
Status In Force
Filing Date 2022-09-12
First Publication Date 2023-01-19
Grant Date 2023-07-18
Owner Abnormal Security Corporation (USA)
Inventor
  • Lee, Yu Zhou
  • Jiang, Kai
  • Tan, Su Li Debbie
  • Sng, Geng
  • Yeh, Cheng-Lin
  • Moore, Lawrence Stockton
  • Liao, Sanny Xiao Lang
  • Cerquera, Joey Esteban
  • Bratman, Jeshua Alexis
  • Jeyakumar, Sanjay
  • Karandikar, Nishant Bhalchandra

Abstract

Deriving and surfacing insights regarding security threats is disclosed. A plurality of features associated with a message is determined. A plurality of facet models is used to analyze the determined features. Based at least in part on the analysis, it is determined that the message poses a security threat. A prioritized set of information is determined to be provided as output that is representative of why the message was determined to pose a security threat. At least a portion of the prioritized set of information is provided as output.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

18.

FEDERATED DATABASE FOR ESTABLISHING AND TRACKING RISK OF INTERACTIONS WITH THIRD PARTIES

      
Application Number 17894637
Status Pending
Filing Date 2022-08-24
First Publication Date 2022-12-22
Owner Abnormal Security Corporation (USA)
Inventor
  • Bratman, Jeshua Alexis
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Habal, Rami Faris
  • Xu, Lei

Abstract

Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors. At a high level, the federated database allows knowledge regarding the reputation of vendors to be shared amongst different enterprises with which those vendors may interact. A threat detection platform may utilize the federated database when determining how to handle incoming emails from vendors.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06Q 10/10 - Office automation; Time management
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • H04L 67/30 - Profiles
  • G06F 16/335 - Filtering based on additional data, e.g. user or group profiles
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding
  • H04L 67/50 - Network services
  • G06F 16/25 - Integrating or interfacing systems involving database management systems

19.

Multi-tiered approach to payload detection for incoming communications

      
Application Number 17831335
Grant Number 11831661
Status In Force
Filing Date 2022-06-02
First Publication Date 2022-12-08
Grant Date 2023-11-28
Owner Abnormal Security Corporation (USA)
Inventor
  • Lee, Yu Zhou
  • Zirn, Micah J.
  • Gultepe, Umut
  • Bratman, Jeshua Alexis
  • Kralka, Michael Douglas
  • Yeh, Cheng-Lin
  • Chechik, Dmitry
  • Jeyakumar, Sanjay

Abstract

A plurality of features associated with a message are determined. At least one feature included in the plurality of features is associated with a payload of the message. A determination is made that supplemental analysis should be performed on the message. The determination is based at least in part on performing behavioral analysis using at least some of the features included in the plurality of features. Supplemental analysis is performed.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/08 - Annexed information, e.g. attachments

20.

INVESTIGATION OF THREATS USING QUERYABLE RECORDS OF BEHAVIOR

      
Application Number 17888899
Status Pending
Filing Date 2022-08-16
First Publication Date 2022-12-08
Owner Abnormal Security Corporation (USA)
Inventor
  • Kao, Jeremy
  • Jiang, Kai Jing
  • Jeyakumar, Sanjay
  • Jung, Yea So
  • Gasperi, Carlos Daniel
  • Young, Justin Anthony

Abstract

Techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises are disclosed. Such techniques can be used to ensure that records are created for digital activities that are deemed unsafe and for digital activities that are deemed safe by a threat detection platform. At a high level, more comprehensively recording digital activities not only provides insight into the behavior of individual accounts, but also provides insight into the holistic behavior of employees across multiple accounts. These records may be stored in a searchable datastore to enable expedient and efficient review.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

21.

Detection and prevention of external fraud

      
Application Number 17877768
Grant Number 11706247
Status In Force
Filing Date 2022-07-29
First Publication Date 2022-11-17
Grant Date 2023-07-18
Owner Abnormal Security Corporation (USA)
Inventor
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Bratman, Jeshua Alexis
  • Xu, Lei
  • Jeyakumar, Sanjay

Abstract

Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed. In one example, a threat detection platform determines the likelihood that an incoming email is indicative of external fraud based on the context and content of the incoming email. To understand the risk posed by an incoming email, the threat detection platform may seek to determine not only whether the sender normally communicates with the recipient, but also whether the topic is one normally discussed by the sender and recipient. In this way, the threat detection platform can establish whether the incoming email deviates from past emails exchanged between the sender and recipient.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 51/08 - Annexed information, e.g. attachments
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

22.

Multichannel threat detection for protecting against account compromise

      
Application Number 17861192
Grant Number 11663303
Status In Force
Filing Date 2022-07-09
First Publication Date 2022-10-27
Grant Date 2023-05-30
Owner Abnormal Security Corporation (USA)
Inventor
  • Habal, Rami Faris
  • Bagri, Abhijit
  • Jung, Yea So
  • Deng, Fang Shuo
  • Kao, Jeremy
  • Bratman, Jeshua Alexis
  • Gultepe, Umut
  • Muthakana, Hariank Sagar

Abstract

Techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication are disclosed. These models can be stored in profiles that are associated with the employees. Such profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Remediation can be performed if an account is determined to be compromised based on its recent activity.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

23.

Abnormal

      
Application Number 1690789
Status Registered
Filing Date 2022-03-02
Registration Date 2022-03-02
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing non-downloadable computer software that utilizes machine learning in the field of cybersecurity; providing non-downloadable computer software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy; computer services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring conduct of those fraudulent individuals and entities on an ongoing basis; computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes; computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities; computer services for generating a federated collection of individuals and entities to prevent security threats Intent to Use: the applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services (term considered too vague by the International Bureau - Rule 13 (2) (b) of the Regulations).

24.

A

      
Application Number 1684541
Status Registered
Filing Date 2022-03-02
Registration Date 2022-03-02
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Non-downloadable software that utilizes machine learning in the field of cybersecurity; non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; computer security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (saas) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (paas) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; design and development of software for management of emails and messaging services namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (saas) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy; computer security system monitoring services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring conduct of those fraudulent individuals and entities on an ongoing basis; computer services for securing personal information for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes; identity validation services [computer security] for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities; providing security services for computer networks, computer access and computerized transactions for generating a federated collection of individuals and entities to prevent security threats.

25.

Discovering email account compromise through assessments of digital activities

      
Application Number 17751261
Grant Number 12081522
Status In Force
Filing Date 2022-05-23
First Publication Date 2022-09-08
Grant Date 2024-09-03
Owner Abnormal Security Corporation (USA)
Inventor
  • Chechik, Dmitry
  • Gultepe, Umut
  • Kargon, Raphael
  • Bratman, Jeshua Alexis
  • Yeh, Cheng-Lin
  • Liao, Sanny Xiao Lang
  • Ludert, Erin Elisabeth Edkins
  • Jeyakumar, Sanjay
  • Muthakana, Hariank Sagar

Abstract

Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise. In particular, a threat detection platform can examine the digital activities performed with the email accounts associated with employees of the enterprise to determine whether any email accounts are exhibiting abnormal behavior. Examples of digital activities include the reception of an incoming email, transmission of an outgoing email, creation of a mail filter, and occurrence of a sign-in event (also referred to as a “login event”). Thus, the threat detection platform can monitor the digital activities performed with a given email account to determine the likelihood that the given email account has been compromised.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 9/40 - Network security protocols
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/222 - Monitoring or handling of messages using geographical location information, e.g. messages transmitted or received in proximity of a certain spot or area

26.

Multistage analysis of emails to identify security threats

      
Application Number 17677822
Grant Number 11973772
Status In Force
Filing Date 2022-02-22
First Publication Date 2022-09-01
Grant Date 2024-04-30
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan
  • Liao, Sanny Xiao Lang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]
  • H04L 9/40 - Network security protocols

27.

Discovering graymail through real-time analysis of incoming email

      
Application Number 17743048
Grant Number 11683284
Status In Force
Filing Date 2022-05-12
First Publication Date 2022-08-25
Grant Date 2023-06-20
Owner Abnormal Security Corporation (USA)
Inventor
  • Habal, Rami F.
  • Lau, Kevin
  • Sankar, Sharan Dev
  • Jung, Yea So
  • Purushottam, Dhruv
  • Krishnamoorthi, Venkat
  • Wang, Franklin X.
  • Bratman, Jeshua Alexis
  • Beauchesne, Jocelyn Mikael Raphael
  • Bagri, Abhijit
  • Jeyakumar, Sanjay

Abstract

Techniques for identifying and processing graymail are disclosed. An electronic message store is accessed. A determination is made that a first message included in the electronic message store represents graymail, including by accessing a profile associated with an addressee of the first message. A remedial action is taken in response to determining that the first message represents graymail.

IPC Classes  ?

  • H04L 51/08 - Annexed information, e.g. attachments
  • H04L 51/42 - Mailbox-related aspects, e.g. synchronisation of mailboxes
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]
  • G06F 9/54 - Interprogram communication

28.

Abuse mailbox for facilitating discovery, investigation, and analysis of email-based threats

      
Application Number 17550848
Grant Number 11949713
Status In Force
Filing Date 2021-12-14
First Publication Date 2022-08-11
Grant Date 2024-04-02
Owner Abnormal Security Corporation (USA)
Inventor
  • Reiser, Evan
  • Kao, Jeremy
  • Yeh, Cheng-Lin
  • Jung, Yea So
  • Jiang, Kai Jing
  • Bagri, Abhijit
  • Tan, Su Li Debbie
  • Kishnamoorthi, Venkatram
  • Deng, Feng Shuo

Abstract

Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
  • G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]

29.

Deriving and surfacing insights regarding security threats

      
Application Number 17547141
Grant Number 11687648
Status In Force
Filing Date 2021-12-09
First Publication Date 2022-06-16
Grant Date 2023-06-27
Owner Abnormal Security Corporation (USA)
Inventor
  • Lee, Yu Zhou
  • Jiang, Kai
  • Tan, Su Li Debbie
  • Sng, Geng
  • Yeh, Cheng-Lin
  • Moore, Lawrence Stockton
  • Liao, Sanny Xiao Lang
  • Cerquera, Joey Esteban
  • Bratman, Jeshua Alexis
  • Jeyakumar, Sanjay
  • Karandikar, Nishant Bhalchandra

Abstract

Deriving and surfacing insights regarding security threats is disclosed. A plurality of features associated with a message is determined. A plurality of facet models is used to analyze the determined features. Based at least in part on the analysis, it is determined that the message poses a security threat. A prioritized set of information is determined to be provided as output that is representative of why the message was determined to pose a security threat. At least a portion of the prioritized set of information is provided as output.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

30.

Discovering graymail through real-time analysis of incoming email

      
Application Number 17509772
Grant Number 11528242
Status In Force
Filing Date 2021-10-25
First Publication Date 2022-04-28
Grant Date 2022-12-13
Owner Abnormal Security Corporation (USA)
Inventor
  • Habal, Rami F.
  • Lau, Kevin
  • Sankar, Sharan Dev
  • Jung, Yea So
  • Purushottam, Dhruv
  • Krishnamoorthi, Venkat
  • Wang, Franklin X.
  • Bratman, Jeshua Alexis
  • Beauchesne, Jocelyn Mikael Raphael
  • Bagri, Abhijit
  • Jeyakumar, Sanjay

Abstract

Techniques for identifying and processing graymail are disclosed. An electronic message store is accessed. A determination is made that a first message included in the electronic message store represents graymail, including by accessing a profile associated with an addressee of the first message. A remedial action is taken in response to determining that the first message represents graymail.

IPC Classes  ?

  • H04L 51/08 - Annexed information, e.g. attachments
  • G06Q 10/10 - Office automation; Time management
  • G06F 9/54 - Interprogram communication
  • H04L 51/42 - Mailbox-related aspects, e.g. synchronisation of mailboxes
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

31.

A

      
Application Number 221095100
Status Pending
Filing Date 2022-03-02
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Non-downloadable software that utilizes machine learning in the field of cybersecurity; non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; computer security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (saas) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (paas) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; design and development of software for management of emails and messaging services namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (saas) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy; computer security system monitoring services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring conduct of those fraudulent individuals and entities on an ongoing basis; computer services for securing personal information for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes; identity validation services [computer security] for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities; providing security services for computer networks, computer access and computerized transactions for generating a federated collection of individuals and entities to prevent security threats.

32.

ABNORMAL

      
Application Number 221667300
Status Pending
Filing Date 2022-03-02
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Providing non-downloadable computer software that utilizes machine learning in the field of cybersecurity; providing non-downloadable computer software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy; computer services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring conduct of those fraudulent individuals and entities on an ongoing basis; computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes; computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities; computer services for generating a federated collection of individuals and entities to prevent security threats Intent to Use: the applicant has a bona fide intention, and is entitled, to use the mark in commerce on or in connection with the identified goods/services (term considered too vague by the International Bureau - Rule 13 (2) (b) of the Regulations).

33.

Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time

      
Application Number 17498273
Grant Number 11552969
Status In Force
Filing Date 2021-10-11
First Publication Date 2022-01-27
Grant Date 2023-01-10
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan
  • Liao, Sanny Xiao Lang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

34.

Detection and prevention of external fraud

      
Application Number 17491184
Grant Number 11496505
Status In Force
Filing Date 2021-09-30
First Publication Date 2022-01-20
Grant Date 2022-11-08
Owner Abnormal Security Corporation (USA)
Inventor
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Bratman, Jeshua Alexis
  • Xu, Lei
  • Jeyakumar, Sanjay

Abstract

Techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise are disclosed. In one example, a threat detection platform determines the likelihood that an incoming email is indicative of external fraud based on the context and content of the incoming email. To understand the risk posed by an incoming email, the threat detection platform may seek to determine not only whether the sender normally communicates with the recipient, but also whether the topic is one normally discussed by the sender and recipient. In this way, the threat detection platform can establish whether the incoming email deviates from past emails exchanged between the sender and recipient.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 51/00 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
  • H04L 51/08 - Annexed information, e.g. attachments

35.

Estimating risk posed by interacting with third parties through analysis of emails addressed to employees of multiple enterprises

      
Application Number 17401143
Grant Number 11483344
Status In Force
Filing Date 2021-08-12
First Publication Date 2021-12-02
Grant Date 2022-10-25
Owner Abnormal Security Corporation (USA)
Inventor
  • Bratman, Jeshua Alexis
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Habal, Rami Faris
  • Xu, Lei

Abstract

Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors. At a high level, the federated database allows knowledge regarding the reputation of vendors to be shared amongst different enterprises with which those vendors may interact. A threat detection platform may utilize the federated database when determining how to handle incoming emails from vendors.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06Q 10/10 - Office automation; Time management
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • H04L 67/30 - Profiles
  • G06F 16/335 - Filtering based on additional data, e.g. user or group profiles
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding
  • H04L 67/50 - Network services
  • G06F 16/25 - Integrating or interfacing systems involving database management systems

36.

Approaches to creating, managing, and applying a federated database to establish risk posed by third parties

      
Application Number 17401161
Grant Number 11477235
Status In Force
Filing Date 2021-08-12
First Publication Date 2021-12-02
Grant Date 2022-10-18
Owner Abnormal Security Corporation (USA)
Inventor
  • Bratman, Jeshua Alexis
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Habal, Rami Faris
  • Xu, Lei

Abstract

Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors. At a high level, the federated database allows knowledge regarding the reputation of vendors to be shared amongst different enterprises with which those vendors may interact. A threat detection platform may utilize the federated database when determining how to handle incoming emails from vendors.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06Q 10/10 - Office automation; Time management
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • H04L 67/30 - Profiles
  • G06F 16/335 - Filtering based on additional data, e.g. user or group profiles
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding
  • H04L 67/50 - Network services
  • G06F 16/25 - Integrating or interfacing systems involving database management systems

37.

Detection and prevention of external fraud

      
Application Number 17239152
Grant Number 11470108
Status In Force
Filing Date 2021-04-23
First Publication Date 2021-10-28
Grant Date 2022-10-11
Owner Abnormal Security Corporation (USA)
Inventor
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Bratman, Jeshua Alexis
  • Xu, Lei
  • Jeyakumar, Sanjay

Abstract

Introduced here are computer programs and computer-implemented techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise. A threat detection platform may determine the likelihood that an incoming email is indicative of external fraud based on the context and content of the incoming email. For example, to understand the risk posed by an incoming email, the threat detection platform may seek to determine not only whether the sender normally communicates with the recipient, but also whether the topic is one normally discussed by the sender and recipient. In this way, the threat detection platform can establish whether the incoming email deviates from past emails exchanged between the sender and recipient.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 51/08 - Annexed information, e.g. attachments
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

38.

DETECTION AND PREVENTION OF EXTERNAL FRAUD

      
Application Number US2021028917
Publication Number 2021/217049
Status In Force
Filing Date 2021-04-23
Publication Date 2021-10-28
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Bratman, Jeshua Alexis
  • Xu, Lei
  • Jeyakumar, Sanjay

Abstract

Introduced here are computer programs and computer-implemented techniques for detecting instances of external fraud by monitoring digital activities that are performed with accounts associated with an enterprise. A threat detection platform may determine the likelihood that an incoming email is indicative of external fraud based on the context and content of the incoming email. For example, to understand the risk posed by an incoming email, the threat detection platform may seek to determine not only whether the sender normally communicates with the recipient, but also whether the topic is one normally discussed by the sender and recipient. In this way, the threat detection platform can establish whether the incoming email deviates from past emails exchanged between the sender and recipient.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

39.

Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior

      
Application Number 17361106
Grant Number 11743294
Status In Force
Filing Date 2021-06-28
First Publication Date 2021-10-21
Grant Date 2023-08-29
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan James
  • Liao, Sanny Xiao Yang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols

40.

ABNORMAL

      
Serial Number 97052999
Status Pending
Filing Date 2021-09-29
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing online non-downloadable software using artifical intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications

41.

A

      
Serial Number 97053007
Status Pending
Filing Date 2021-09-29
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Providing online non-downloadable software using artificial intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications

42.

PROGRAMMATIC DISCOVERY, RETRIEVAL, AND ANALYSIS OF COMMUNICATIONS TO IDENTIFY ABNORMAL COMMUNICATION ACTIVITY

      
Application Number 17341200
Status Pending
Filing Date 2021-06-07
First Publication Date 2021-09-23
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan James
  • Liao, Sanny Xiao Yang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06Q 10/10 - Office automation; Time management
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/58 - Message switching systems

43.

Investigation of threats using queryable records of behavior

      
Application Number 17200459
Grant Number 11451576
Status In Force
Filing Date 2021-03-12
First Publication Date 2021-09-16
Grant Date 2022-09-20
Owner Abnormal Security Corporation (USA)
Inventor
  • Kao, Jeremy
  • Jiang, Kai Jing
  • Jeyakumar, Sanjay
  • Jung, Yea So
  • Gasperi, Carlos Daniel
  • Young, Justin Anthony

Abstract

Introduced here are computer programs and computer-implemented techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises. Such an approach ensures that records are created for digital activities that are deemed unsafe and for digital activities that are deemed safe by a threat detection platform. At a high level, more comprehensively recording digital activities not only provides insight into the behavior of individual accounts, but also provides insight into the holistic behavior of employees across multiple accounts. These records may be stored in a searchable datastore to enable expedient and efficient review.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

44.

IMPROVED INVESTIGATION OF THREATS USING QUERYABLE RECORDS OF BEHAVIOR

      
Application Number US2021022190
Publication Number 2021/183939
Status In Force
Filing Date 2021-03-12
Publication Date 2021-09-16
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Kao, Jeremy
  • Jiang, Kai Jing
  • Jeyakumar, Sanjay
  • Jung, Yea So
  • Gasperi, Carlos Daniel
  • Young, Justin Anthony

Abstract

Introduced here are computer programs and computer-implemented techniques for producing records of digital activities that are performed with accounts associated with employees of enterprises. Such an approach ensures that records are created for digital activities that are deemed unsafe and for digital activities that are deemed safe by a threat detection platform. At a high level, more comprehensively recording digital activities not only provides insight into the behavior of individual accounts, but also provides insight into the holistic behavior of employees across multiple accounts. These records may be stored in a searchable datastore to enable expedient and efficient review.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

45.

ABUSE MAILBOX FOR FACILITATING DISCOVERY, INVESTIGATION, AND ANALYSIS OF EMAIL-BASED THREATS

      
Application Number US2021019965
Publication Number 2021/178243
Status In Force
Filing Date 2021-02-26
Publication Date 2021-09-10
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Reiser, Evan James
  • Kao, Jeremy
  • Yeh, Cheng-Lin
  • Jung, Yea So
  • Jiang, Kai Jing
  • Bagri, Abhijit
  • Tan, Su Li Debbie
  • Krishnamoorthi, Venkatram
  • Deng, Fang Shuo

Abstract

Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an "abuse mailbox" or "phishing mailbox." The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.

IPC Classes  ?

  • H04L 12/58 - Message switching systems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06Q 10/10 - Office automation; Time management
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

46.

MULTICHANNEL THREAT DETECTION FOR PROTECTING AGAINST ACCOUNT COMPROMISE

      
Application Number US2021020499
Publication Number 2021/178423
Status In Force
Filing Date 2021-03-02
Publication Date 2021-09-10
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Habal, Rami Faris
  • Bagri, Abhijit
  • Jung, Yea So
  • Deng, Fang Shuo
  • Kao, Jeremy
  • Bratman, Jeshua Alexis
  • Gultepe, Umut
  • Muthakana, Hariank Sagar

Abstract

Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism

47.

Federated database for establishing and tracking risk of interactions with third parties

      
Application Number 17185570
Grant Number 11477234
Status In Force
Filing Date 2021-02-25
First Publication Date 2021-09-02
Grant Date 2022-10-18
Owner Abnormal Security Corporation (USA)
Inventor
  • Bratman, Jeshua Alexis
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Habal, Rami Faris
  • Xu, Lei

Abstract

Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors. At a high level, the federated database allows knowledge regarding the reputation of vendors to be shared amongst different enterprises with which those vendors may interact. A threat detection platform may utilize the federated database when determining how to handle incoming emails from vendors.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06Q 10/10 - Office automation; Time management
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • H04L 67/30 - Profiles
  • G06F 16/335 - Filtering based on additional data, e.g. user or group profiles
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding
  • H04L 67/50 - Network services
  • G06F 16/25 - Integrating or interfacing systems involving database management systems

48.

FEDERATED DATABASE FOR ESTABLISHING AND TRACKING RISK OF INTERACTIONS WITH THIRD PARTIES

      
Application Number US2021019977
Publication Number 2021/174050
Status In Force
Filing Date 2021-02-26
Publication Date 2021-09-02
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Bratman, Jeshua Alexis
  • Lee, Yu Zhou
  • Moore, Lawrence Stockton
  • Habal, Rami Faris
  • Xu, Lei

Abstract

Introduced here are computer programs and computer-implemented techniques for generating and then managing a federated database that can be used to ascertain the risk in interacting with vendors. At a high level, the federated database allows knowledge regarding the reputation of vendors to be shared amongst different enterprises with which those vendors may interact. A threat detection platform may utilize the federated database when determining how to handle incoming emails from vendors.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

49.

Abuse mailbox for facilitating discovery, investigation, and analysis of email-based threats

      
Application Number 17155843
Grant Number 11252189
Status In Force
Filing Date 2021-01-22
First Publication Date 2021-09-02
Grant Date 2022-02-15
Owner Abnormal Security Corporation (USA)
Inventor
  • Reiser, Evan James
  • Kao, Jeremy
  • Yeh, Cheng-Lin
  • Jung, Yea So
  • Jiang, Kai Jing
  • Bagri, Abhijit
  • Tan, Su Li Debbie
  • Krishnamoorthi, Venkatram
  • Deng, Fang Shuo

Abstract

Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an “abuse mailbox” or “phishing mailbox.” The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
  • G06Q 10/10 - Office automation; Time management

50.

Multichannel threat detection for protecting against account compromise

      
Application Number 17190105
Grant Number 11790060
Status In Force
Filing Date 2021-03-02
First Publication Date 2021-09-02
Grant Date 2023-10-17
Owner Abnormal Security Corporation (USA)
Inventor
  • Habal, Rami Faris
  • Bagri, Abhijit
  • Jung, Yea So
  • Deng, Fang Shuo
  • Kao, Jeremy
  • Bratman, Jeshua Alexis
  • Gultepe, Umut
  • Muthakana, Hariank Sagar

Abstract

Introduced here are computer programs and computer-implemented techniques for building, training, or otherwise developing models of the behavior of employees across more than one channel used for communication. These models can be stored in profiles that are associated with the employees. At a high level, these profiles allow behavior to be monitored across multiple channels so that deviations can be detected and then examined. Moreover, remediation may be performed if an account is determined to be compromised based on its recent activity.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

51.

Discovering email account compromise through assessments of digital activities

      
Application Number 17094801
Grant Number 11470042
Status In Force
Filing Date 2020-11-10
First Publication Date 2021-08-26
Grant Date 2022-10-11
Owner Abnormal Security Corporation (USA)
Inventor
  • Chechik, Dmitry
  • Gultepe, Umut
  • Kargon, Raphael
  • Bratman, Jeshua Alexis
  • Yeh, Cheng-Lin
  • Liao, Sanny Xiao Lang
  • Ludert, Erin Elisabeth Edkins
  • Jeyakumar, Sanjay
  • Muthakana, Hariank

Abstract

Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise. In particular, a threat detection platform can examine the digital activities performed with the email accounts associated with employees of the enterprise to determine whether any email accounts are exhibiting abnormal behavior. Examples of digital activities include the reception of an incoming email, transmission of an outgoing email, creation of a mail filter, and occurrence of a sign-in event (also referred to as a “login event”). Thus, the threat detection platform can monitor the digital activities performed with a given email account to determine the likelihood that the given email account has been compromised.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 9/40 - Network security protocols
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/222 - Monitoring or handling of messages using geographical location information, e.g. messages transmitted or received in proximity of a certain spot or area

52.

DISCOVERING EMAIL ACCOUNT COMPROMISE THROUGH ASSESSMENTS OF DIGITAL ACTIVITIES

      
Application Number US2021019030
Publication Number 2021/168407
Status In Force
Filing Date 2021-02-22
Publication Date 2021-08-26
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Chechik, Dmitry
  • Gultepe, Umut
  • Kargon, Raphael
  • Bratman, Jeshua Alexis
  • Yeh, Cheng-Lin
  • Liao, Sanny Xiao Lang
  • Ludert, Erin Elisabeth Edkins
  • Jeyakumar, Sanjay
  • Muthakana, Hariank

Abstract

Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise. In particular, a threat detection platform can examine the digital activities performed with the email accounts associated with employees of the enterprise to determine whether any email accounts are exhibiting abnormal behavior. Examples of digital activities include the reception of an incoming email, transmission of an outgoing email, creation of a mail filter, and occurrence of a sign-in event (also referred to as a "login event"). Thus, the threat detection platform can monitor the digital activities performed with a given email account to determine the likelihood that the given email account has been compromised.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

53.

PEOPLEBASE

      
Application Number 1599842
Status Registered
Filing Date 2021-04-07
Registration Date 2021-04-07
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services for evaluating email and relational items to identify fraudulent individuals and then monitoring conduct of those fraudulent individuals on an ongoing basis; computer services for recording behaviors of individuals deemed to be fraudulent in a blacklist for security purposes; computer services for tracking digital activities of individuals determined to be fraudulent based on an analysis of emails sent by those vendors; computer services for generating a federated collection of individual behaviors to prevent security threats; computer services for generating a federated blacklist of individuals and associated behaviors to prevent fraud; computer services for creating, populating, and managing blacklists of individuals determined to be security threats due to involvement in past digital activities; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy.

54.

VENDORBASE

      
Application Number 1599883
Status Registered
Filing Date 2021-04-07
Registration Date 2021-04-07
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis; computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes; computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors; computer services for generating a federated collection of vendor behaviors to prevent security threats; computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud; computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy.

55.

VENDORBASE

      
Application Number 211809400
Status Registered
Filing Date 2021-04-07
Registration Date 2023-02-01
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving vendors to identify security threats; computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors, namely, monitoring digital communications involving vendors determined to be fraudulent to identify security threats; computer services for generating a federated collection of vendor behaviors to prevent security threats, namely, identifying and cataloging vendor behaviors through analysis of digital communications; computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud, namely, establishing a federated blacklist by analyzing digital communications involving vendors; computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of vendors for the purpose of identifying security threats; computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; computer security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy.

56.

PEOPLEBASE

      
Application Number 211809500
Status Registered
Filing Date 2021-04-07
Registration Date 2024-03-28
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer services for evaluating email and relational items to identify fraudulent individuals and then monitoring conduct of those fraudulent individuals on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; computer services for recording behaviors of individuals deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals to identify security threats; computer services for tracking digital activities of individuals determined to be fraudulent based on an analysis of emails sent by those vendors; computer services for generating a federated collection of individual behaviors to prevent security threats, namely, identifying and cataloging individual behaviors through analysis of digital communications; computer services for generating a federated blacklist of individuals and associated behaviors to prevent fraud; computer services for creating, populating, and managing blacklists of individuals determined to be security threats due to involvement in past digital activities; computer services for analyzing digital activities to discover security threats; computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; security services, namely, monitoring, detecting, and remediating instances of account takeover; software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy.

57.

Discovering email account compromise through assessments of digital activities

      
Application Number 16888129
Grant Number 10911489
Status In Force
Filing Date 2020-05-29
First Publication Date 2021-02-02
Grant Date 2021-02-02
Owner Abnormal Security Corporation (USA)
Inventor
  • Chechik, Dmitry
  • Gultepe, Umut
  • Kargon, Raphael
  • Bratman, Jeshua Alexis
  • Yeh, Cheng-Lin
  • Liao, Sanny Xiao Lang
  • Ludert, Erin Elisabeth Edkins
  • Jeyakumar, Sanjay

Abstract

Introduced here are threat detection platforms designed to discover possible instances of email account compromise in order to identify threats to an enterprise. In particular, a threat detection platform can examine the digital activities performed with the email accounts associated with employees of the enterprise to determine whether any email accounts are exhibiting abnormal behavior. Examples of digital activities include the reception of an incoming email, transmission of an outgoing email, creation of a mail filter, and occurrence of a sign-in event (also referred to as a “login event”). Thus, the threat detection platform can monitor the digital activities performed with a given email account to determine the likelihood that the given email account has been compromised.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/58 - Message switching systems
  • G06N 20/00 - Machine learning

58.

Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior

      
Application Number 16927335
Grant Number 11050793
Status In Force
Filing Date 2020-07-13
First Publication Date 2020-12-17
Grant Date 2021-06-29
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan James
  • Liao, Sanny Xiao Yang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning

59.

Programmatic discovery, retrieval, and analysis of communications to identify abnormal communication activity

      
Application Number 16927478
Grant Number 11032312
Status In Force
Filing Date 2020-07-13
First Publication Date 2020-12-10
Grant Date 2021-06-08
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan James
  • Liao, Sanny Xiao Yang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06Q 10/10 - Office automation; Time management
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/58 - Message switching systems

60.

PEOPLEBASE

      
Serial Number 90318457
Status Pending
Filing Date 2020-11-13
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services for evaluating email and relational items to identify fraudulent individuals and then monitoring conduct of those fraudulent individuals on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; Computer services for recording behaviors of individuals deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications to identify security threats; Computer services for tracking digital activities of individuals determined to be fraudulent based on an analysis of emails sent by those individuals, namely, monitoring digital communications involving individuals determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individual behaviors to prevent security threats, namely, identifying and cataloging individual behaviors through analysis of digital communications; Computer services for generating a federated blacklist of individuals and associated behaviors to prevent fraud, namely, establishing a federated blocklist by analyzing digital communications; Computer services for creating, populating, and managing blacklists of individuals determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of individuals for the purpose of identifying security threats; Computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy

61.

VENDORBASE

      
Serial Number 90318446
Status Registered
Filing Date 2020-11-13
Registration Date 2022-01-25
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving vendors to identify security threats; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors, namely, monitoring digital communications involving vendors determined to be fraudulent to identify security threats; Computer services for generating a federated collection of vendor behaviors to prevent security threats, namely, identifying and cataloging vendor behaviors through analysis of digital communications; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud, namely, establishing a federated blacklist by analyzing digital communications involving vendors; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of vendors for the purpose of identifying security threats; Computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy

62.

Multistage analysis of emails to identify security threats

      
Application Number 16927427
Grant Number 11431738
Status In Force
Filing Date 2020-07-13
First Publication Date 2020-10-29
Grant Date 2022-08-30
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan James
  • Liao, Sanny Xiao Yang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06N 20/00 - Machine learning
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06Q 10/10 - Office automation; Time management
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • H04L 9/40 - Network security protocols

63.

Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time

      
Application Number 16672854
Grant Number 11824870
Status In Force
Filing Date 2019-11-04
First Publication Date 2020-06-25
Grant Date 2023-11-21
Owner Abnormal Security Corporation (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua Alexis
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan James
  • Liao, Sanny Xiao Yang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

64.

THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIME

      
Document Number 03120469
Status Pending
Filing Date 2019-12-18
Open to Public Date 2020-06-25
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan
  • Liao, Sanny Xiao Yang
  • Lee, Yu Zhou
  • Gasperi, Carlos Daniel
  • Lau, Kevin
  • Jiang, Kai Jing
  • Tan, Su Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06N 20/00 - Machine learning
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking

65.

THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIME

      
Application Number US2019067279
Publication Number 2020/132137
Status In Force
Filing Date 2019-12-18
Publication Date 2020-06-25
Owner ABNORMAL SECURITY CORPORATION (USA)
Inventor
  • Jeyakumar, Sanjay
  • Bratman, Jeshua
  • Chechik, Dmitry
  • Bagri, Abhijit
  • Reiser, Evan
  • Liao, Sanny Xiao Yang
  • Lee, Yu, Zhou
  • Gasperi, Carlos, Daniel
  • Lau, Kevin
  • Jiang, Kai, Jing
  • Tan, Su, Li Debbie
  • Kao, Jeremy
  • Yeh, Cheng-Lin

Abstract

Conventional email filtering services are not suitable for recognizing sophisticated malicious emails, and therefore may allow sophisticated malicious emails to reach inboxes by mistake. Introduced here are threat detection platforms designed to take an integrative approach to detecting security threats. For example, after receiving input indicative of an approval from an individual to access past email received by employees of an enterprise, a threat detection platform can download past emails to build a machine learning (ML) model that understands the norms of communication with internal contacts (e.g., other employees) and/or external contacts (e.g., vendors). By applying the ML model to incoming email, the threat detection platform can identify security threats in real time in a targeted manner.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06N 20/00 - Machine learning
  • H04L 29/02 - Communication control; Communication processing

66.

ABNORMAL SECURITY

      
Application Number 1515067
Status Registered
Filing Date 2019-12-13
Registration Date 2019-12-13
Owner Abnormal Security Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software for ensuring the security of electronic mail; electronic mail and messaging software; computer software for collection, storage, analysis and presentation of data for forensic analysis of security events and for security compliance; computer software for the administration, monitoring, management, assessment and quantification of security and data breach vulnerability risks. Secure e-mail services. Computer services, namely, electronic mail protection and security services; Software as a service (SaaS) featuring software for use in the analysis and protection of the security of email and network communications and data; Platform as a service (PAAS) for use in the analysis and protection of the security of email and network communications and data; Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of data and emails recorded in electronic media; Software as a service (SAAS) featuring software for use in the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, and email continuity and email security; design and development of antivirus software; computer security consultancy.

67.

ABNORMAL SECURITY

      
Application Number 201281700
Status Registered
Filing Date 2019-12-13
Registration Date 2021-09-15
Owner Abnormal Security Corporation (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Electronic mail (email) protection and security services, namely, on-line scanning, detecting, quarantining and elimination of viruses, worms, trojans, spyware, adware, malware, social engineering based intrusions and exploits, and unauthorized data and programs from user electronic mails; Software as a service (SaaS) featuring software for the analysis and protection of the security of email and network communications and data; Platform as a service (PAAS) featuring computer software platforms for the analysis and protection of the security of email and network communications and data; email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of emails recorded in electronic media; Software as a service (SAAS) featuring software for the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity and email security; computer security consultancy; none of the aforementioned related to data encryption services, design and development of downloadable mobile computer applications for computer devices or electronic data storage.

68.

ABNORMAL BEHAVIORAL TECHNOLOGY

      
Serial Number 88675380
Status Registered
Filing Date 2019-10-31
Registration Date 2020-10-27
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Electronic mail (email) protection and security services, namely, on-line scanning, detecting, quarantining and elimination of viruses, worms, trojans, spyware, adware, malware, social engineering based intrusions and exploits, and unauthorized data and programs from user electronic mails; Software as a service (SaaS) featuring software for the analysis and protection of the security of email and network communications and data; Platform as a service (PAAS) featuring computer software platforms for the analysis and protection of the security of email and network communications and data; Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of emails recorded in electronic media; Software as a service (SAAS) featuring software for the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity and email security; computer security consultancy; none of the aforementioned related to data encryption services, design and development of downloadable mobile computer applications for computer devices or electronic data storage

69.

ABNORMAL SECURITY

      
Serial Number 88657464
Status Registered
Filing Date 2019-10-16
Registration Date 2021-05-25
Owner Abnormal Security Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Electronic mail (email) protection and security services, namely, on-line scanning, detecting, quarantining and elimination of viruses, worms, trojans, spyware, adware, malware, social engineering based intrusions and exploits, and unauthorized data and programs from user electronic mails; Software as a service (SaaS) featuring software for the analysis and protection of the security of email and network communications and data; Platform as a service (PAAS) featuring computer software platforms for the analysis and protection of the security of email and network communications and data; Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of emails recorded in electronic media; Software as a service (SAAS) featuring software for the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity and email security; computer security consultancy; none of the aforementioned related to data encryption services, design and development of downloadable mobile computer applications for computer devices or electronic data storage