Patents by Inventor Andrew Pendergast

Andrew Pendergast has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250190543
    Abstract: Techniques are disclosed relate to systems, methods, and non-transitory computer readable media for implementing a browser extension for cyber threat intelligence and response. One system to perform operations comprising: scanning, in a sandbox of a browser by a browser extension, at least part of a web page to produce a set of items of interests; transmitting the set of items of interests to a cloud-based enrichment and analysis of cybersecurity threat intelligence system to request information on the set of items; receiving a response from the cloud-based enrichment and analysis of cybersecurity threat intelligence system, the response including a scan result based on the transmitted set of items of interests, and the scan result including at least one of an indicator of compromise of the at least scanned part of the web page; and displaying the scan results including the at least one of an indicator of compromise.
    Type: Application
    Filed: February 13, 2025
    Publication date: June 12, 2025
    Applicant: ThreatConnect, Inc.
    Inventors: Edward HINKLE, Mashell RODRIGUEZ, Markika CHAUVIN, Daniel COLE, Andrew PENDERGAST, Kathryn Grayson NANZ
  • Patent number: 12229246
    Abstract: Techniques are disclosed relate to systems, methods, and non-transitory computer readable media for implementing a browser extension for cyber threat intelligence and response. One system to perform operations comprising: scanning, in a sandbox of a browser by a browser extension, at least part of a web page to produce a set of items of interests; transmitting the set of items of interests to a cloud-based enrichment and analysis of cybersecurity threat intelligence system to request information on the set of items; receiving a response from the cloud-based enrichment and analysis of cybersecurity threat intelligence system, the response including a scan result based on the transmitted set of items of interests, and the scan result including at least one of an indicator of compromise of the at least scanned part of the web page; and displaying the scan results including the at least one of an indicator of compromise.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: February 18, 2025
    Assignee: ThreatConnect, Inc.
    Inventors: Edward Hinkle, Mashell Rodriguez, Marika Chauvin, Daniel Cole, Andrew Pendergast, Kathryn Grayson Nanz
  • Patent number: 11985144
    Abstract: Techniques are disclosed relate to systems, methods, and non-transitory computer readable media for implementing a browser extension for cyber threat intelligence and response. One system to perform operations comprising: receiving, in a sandbox of a browser by a browser extension, a selection of at least one particular indicator of compromise of the at least one of the indicator of compromise of at least scanned part of a web page; displaying one or more orchestrated responses; receiving a selection of at least one particular orchestrated response of the one or more orchestrated responses; transmitting the selected at least one particular orchestrated response to the cloud-based enrichment and analysis of cybersecurity threat intelligence system; receiving a response including a result of the at least one particular orchestrated response; and displaying the result of the at least one particular orchestrated response.
    Type: Grant
    Filed: June 25, 2021
    Date of Patent: May 14, 2024
    Assignee: ThreatConnect, Inc.
    Inventors: Edward Hinkle, Mashell Rodriguez, Marika Chauvin, Daniel Cole, Andrew Pendergast, Kathryn Grayson Nanz
  • Publication number: 20220417263
    Abstract: Techniques are disclosed relate to systems, methods, and non-transitory computer readable media for implementing a browser extension for cyber threat intelligence and response. One system to perform operations comprising: receiving, in a sandbox of a browser by a browser extension, a selection of at least one particular indicator of compromise of the at least one of the indicator of compromise of at least scanned part of a web page; displaying one or more orchestrated responses; receiving a selection of at least one particular orchestrated response of the one or more orchestrated responses; transmitting the selected at least one particular orchestrated response to the cloud-based enrichment and analysis of cybersecurity threat intelligence system; receiving a response including a result of the at least one particular orchestrated response; and displaying the result of the at least one particular orchestrated response.
    Type: Application
    Filed: June 25, 2021
    Publication date: December 29, 2022
    Applicant: ThreatConnect, Inc.
    Inventors: Edward HINKLE, Mashell RODRIGUEZ, Marika CHAUVIN, Daniel COLE, Andrew PENDERGAST, Kathryn Grayson NANZ
  • Publication number: 20220414206
    Abstract: Techniques are disclosed relate to systems, methods, and non-transitory computer readable media for implementing a browser extension for cyber threat intelligence and response. One system to perform operations comprising: scanning, in a sandbox of a browser by a browser extension, at least part of a web page to produce a set of items of interests; transmitting the set of items of interests to a cloud-based enrichment and analysis of cybersecurity threat intelligence system to request information on the set of items; receiving a response from the cloud-based enrichment and analysis of cybersecurity threat intelligence system, the response including a scan result based on the transmitted set of items of interests, and the scan result including at least one of an indicator of compromise of the at least scanned part of the web page; and displaying the scan results including the at least one of an indicator of compromise.
    Type: Application
    Filed: June 25, 2021
    Publication date: December 29, 2022
    Applicant: ThreatConnect, Inc.
    Inventors: Edward HINKLE, Mashell RODRIGUEZ, Marika CHAUVIN, Daniel COLE, Andrew PENDERGAST, Kathryn Grayson NANZ
  • Patent number: 11245713
    Abstract: Techniques are disclosed which can provide an orchestrated response to a cybersecurity threat. This orchestrated response may be based upon, at least in part, a reputation score. Threat model(s) may be received that identify cybersecurity threat(s). An indication of observations, false positives, and/or page views for the threat may be obtained. Data feeds may be received including known good data feeds, known bad data feeds, and enrichment data feeds. The data feeds may provide information about one or more indicators of compromise (IOC). For each IOC, a weighted criticality score may be determined. The weighted criticality score may be mapped to a corresponding point value. An aggregated score may be determined based upon at least the corresponding point value. A reputation score may be computed, and in some configurations, provided to a user.
    Type: Grant
    Filed: April 24, 2020
    Date of Patent: February 8, 2022
    Assignee: THREATCONNECT, INC.
    Inventors: Andrew Pendergast, Andrew Gidwani, Daniel Cole, Jason Spies, Bhaskar Karambelkar, Christopher Johnson, Danny Tineo
  • Publication number: 20200252421
    Abstract: Techniques are disclosed which can provide an orchestrated response to a cybersecurity threat. This orchestrated response may be based upon, at least in part, a reputation score. Threat model(s) may be received that identify cybersecurity threat(s). An indication of observations, false positives, and/or page views for the threat may be obtained. Data feeds may be received including known good data feeds, known bad data feeds, and enrichment data feeds. The data feeds may provide information about one or more indicators of compromise (IOC). For each IOC, a weighted criticality score may be determined. The weighted criticality score may be mapped to a corresponding point value. An aggregated score may be determined based upon at least the corresponding point value. A reputation score may be computed, and in some configurations, provided to a user.
    Type: Application
    Filed: April 24, 2020
    Publication date: August 6, 2020
    Applicant: ThreatConnect, Inc.
    Inventors: Andrew PENDERGAST, Andrew GIDWANI, Daniel COLE, Jason SPIES, Bhaskar KARAMBELKAR, Christopher JOHNSON, Danny TINEO
  • Patent number: 10681071
    Abstract: Techniques are disclosed which can provide an orchestrated response to a cybersecurity threat. This orchestrated response may be based upon, at least in part, a reputation score. Threat model(s) may be received that identify cybersecurity threat(s). An indication of observations, false positives, and/or page views for the threat may be obtained. Data feeds may be received including known good data feeds, known bad data feeds, and enrichment data feeds. The data feeds may provide information about one or more indicators of compromise (IOC). For each IOC, a weighted criticality score may be determined. The weighted criticality score may be mapped to a corresponding point value. An aggregated score may be determined based upon at least the corresponding point value. A reputation score may be computed, and in some configurations, provided to a user.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: June 9, 2020
    Assignee: ThreatConnect, Inc.
    Inventors: Andrew Pendergast, Andrew Gidwani, Daniel Cole, Jason Spies, Bhaskar Karambelkar, Christopher Johnson, Danny Tineo