Patents by Inventor Elisabeth Weber

Elisabeth Weber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230247046
    Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.
    Type: Application
    Filed: April 11, 2023
    Publication date: August 3, 2023
    Applicant: Expel, Inc.
    Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
  • Patent number: 11658999
    Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.
    Type: Grant
    Filed: February 15, 2022
    Date of Patent: May 23, 2023
    Assignee: Expel, Inc.
    Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
  • Publication number: 20230038671
    Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of dis
    Type: Application
    Filed: October 20, 2022
    Publication date: February 9, 2023
    Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
  • Patent number: 11509689
    Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of dis
    Type: Grant
    Filed: March 16, 2022
    Date of Patent: November 22, 2022
    Assignee: Expel, Inc.
    Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
  • Publication number: 20220337621
    Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.
    Type: Application
    Filed: February 15, 2022
    Publication date: October 20, 2022
    Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
  • Publication number: 20220210190
    Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of dis
    Type: Application
    Filed: March 16, 2022
    Publication date: June 30, 2022
    Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
  • Patent number: 11310270
    Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of dis
    Type: Grant
    Filed: October 14, 2021
    Date of Patent: April 19, 2022
    Assignee: Expel, Inc.
    Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
  • Publication number: 20220116414
    Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.
    Type: Application
    Filed: September 29, 2021
    Publication date: April 14, 2022
    Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
  • Publication number: 20220116420
    Abstract: A system and method for accelerating a cybersecurity event detection and remediation includes extracting corpora of feature data from a suspicious electronic communication, wherein the corpora of feature data comprise at least one corpus of text data extracted from a body of the suspicious electronic communication; computing at least one text embedding value for the suspicious electronic communication; evaluating the text embedding values of the corpus of text data against an n-dimensional mapping of adverse electronic communication vectors, the n-dimensional mapping comprising a plurality of historical electronic communication vectors derived for a plurality of historical electronic communications; identifying whether the suspicious electronic communication comprises one of an adverse electronic communication based on the evaluation of the text embedding value, and accelerating a cybersecurity event detection by routing data associated with the suspicious electronic communication to one of a plurality of dis
    Type: Application
    Filed: October 14, 2021
    Publication date: April 14, 2022
    Inventors: Elisabeth Weber, Peter Silberman, Shamus Field
  • Patent number: 11303666
    Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: April 12, 2022
    Assignee: Expel, Inc.
    Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
  • Publication number: 20220038541
    Abstract: Example apparatus disclosed herein determine a first candidate duration of a session based on a first difference between a first time associated with a first start ping and a second time associated with a first end ping, the first start ping and the first end ping identified from a plurality of pings based on a first partitioning scheme. Disclosed example apparatus also determine a second candidate duration of the session based on a second difference between a third time associated with a second start ping and a fourth time associated with a second end ping, the second start ping and the second end ping identified from the plurality of pings based on a second partitioning scheme. Disclosed example apparatus further select at least one of the first candidate duration or the second candidate duration to represent the session based on a demographics model.
    Type: Application
    Filed: October 18, 2021
    Publication date: February 3, 2022
    Inventors: Denis Voytenko, Rachel Worth Olson, Elisabeth Weber, Richard Peters, Paul Chimenti, David J. Kurzynski
  • Patent number: 11153392
    Abstract: Methods, apparatus, systems and articles of manufacture to build viewing sessions from ping-level data are disclosed herein. An example apparatus includes a threshold calculator to determine a threshold based on reference sessions represented in panel data obtained from panel meters. The example apparatus also includes a session partitioner to determine if a first ping from a device corresponds to a start ping of the session and a second ping from the device corresponds to an end ping of the session based on (i) the threshold, (ii) first payload data from the first ping, and (iii) second payload data from the second ping. The example apparatus includes the session partitioner to also determine a duration of the session based on a difference between a first time associated with the first ping and a second time associated with the second ping.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: October 19, 2021
    Assignee: The Nielsen Company (US), LLC
    Inventors: Denis Voytenko, Rachel Worth Olson, Elisabeth Weber, Richard Peters, Paul Chimenti, David J. Kurzynski
  • Publication number: 20210168214
    Abstract: Methods, apparatus, systems and articles of manufacture to build viewing sessions from ping-level data are disclosed herein. An example apparatus includes a threshold calculator to determine a threshold based on reference sessions represented in panel data obtained from panel meters. The example apparatus also includes a session partitioner to determine if a first ping from a device corresponds to a start ping of the session and a second ping from the device corresponds to an end ping of the session based on (i) the threshold, (ii) first payload data from the first ping, and (iii) second payload data from the second ping. The example apparatus includes the session partitioner to also determine a duration of the session based on a difference between a first time associated with the first ping and a second time associated with the second ping.
    Type: Application
    Filed: December 3, 2019
    Publication date: June 3, 2021
    Inventors: Denis Voytenko, Rachel Worth Olson, Elisabeth Weber, Richard Peters, Paul Chimenti, David J. Kurzynski