Patents by Inventor Jeff LoSAPIO

Jeff LoSAPIO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220210181
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Application
    Filed: March 14, 2022
    Publication date: June 30, 2022
    Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Frederick Wescoe, Jason R. Brubaker, Jason Hong
  • Patent number: 11310261
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: April 19, 2022
    Assignee: Proofpoint, Inc.
    Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20210021632
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Application
    Filed: June 24, 2020
    Publication date: January 21, 2021
    Inventors: Trevor Tyler Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Patent number: 10749887
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: August 18, 2020
    Assignee: Proofpoint, Inc.
    Inventors: Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20170244746
    Abstract: Various embodiments assess security risks of users in computing networks. In some embodiments, an interaction item is sent to an end user electronic device. When the end user interacts with the interaction item, the system collects feedback data that includes information about the user's interaction with the interaction item, as well as technical information about the electronic device. The feedback is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for the user with respect to a computing network.
    Type: Application
    Filed: April 20, 2017
    Publication date: August 24, 2017
    Inventors: Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Miller, Jeff Losapio, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20150229664
    Abstract: Various embodiments assess security risks of users in computing networks. In one embodiment, a set of input data is obtained. The set of input data comprises at least one of security item interaction data, training interaction data, and technical information for each of a set of users in a plurality of users associated with an entity. The security item interaction data comprises at least one action performed by each of the set of users with respect to at least one computing network-based security item presented to each of the set of users. The set of input data to is compared to a plurality of security risk scoring metrics. Based on this comparison, a security risk score for each of the set of users with respect to a computing network is calculated.
    Type: Application
    Filed: February 12, 2015
    Publication date: August 13, 2015
    Inventors: Trevor Tyler HAWTHORN, Nathan MILLER, Jeff LoSAPIO