Patents by Inventor Brian Sanford
Brian Sanford has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250071144Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive image data of a graphical rendering of a resource available at a uniform resource locator (URL). The computing platform may compute a computer vision vector representation of the image data. The computing platform may compare the computer vision vector representation of the image data to stored numeric vectors representing page elements, resulting in a feature indicating whether the computer vision vector representation of the image data is visually similar to a known page element, and may input the feature to a classifier. The computing platform may receive, from the classifier, a phish classification score indicating a likelihood that the URL is malicious. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: ApplicationFiled: November 8, 2024Publication date: February 27, 2025Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dallan Quass
-
Patent number: 12212070Abstract: Omni-directional orthogonally-polarized antenna system for MIMO applications are disclosed herein. An example antenna system comprises two arrays of horizontally polarized radiating elements, and two arrays of vertically polarized radiating elements, each array having roughly 180-degree radiation pattern, disposed about a central axis in a common horizontal plane, arrays of common polarization separated by 180-degrees. Also, the example antenna system includes at least one printed circuit board having a saw tooth pattern, wherein uniform coverage in both vertical and horizontal polarization over 360 degrees is provided using beamforming and polarization diversity.Type: GrantFiled: January 23, 2024Date of Patent: January 28, 2025Assignee: Mimosa Networks, Inc.Inventors: John Sanford, Brian L. Hinman, Justin Lee, Carlos Ramos, Syed Aon Mujtaba
-
Patent number: 12166796Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive image data of a graphical rendering of a resource available at a uniform resource locator (URL). The computing platform may compute a computer vision vector representation of the image data. The computing platform may compare the computer vision vector representation of the image data to stored numeric vectors representing page elements, resulting in a feature indicating whether the computer vision vector representation of the image data is visually similar to a known page element, and may input the feature to a classifier. The computing platform may receive, from the classifier, a phish classification score indicating a likelihood that the URL is malicious. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: GrantFiled: September 12, 2023Date of Patent: December 10, 2024Assignee: Proofpoint, Inc.Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dallan Quass
-
Publication number: 20240320276Abstract: Aspects of the disclosure relate to using a machine learning system to process a corpus of documents associated with a user to determine a user-specific consequence index. A computing platform may load a corpus of documents associated with a user. Subsequently, the computing platform may create a first plurality of smart groups based on the corpus of documents, and then may generate a first user interface comprising a representation of the first plurality of smart groups. Next, the computing platform may receive user input applying one or more labels to a plurality of documents associated with at least one smart group. Subsequently, the computing platform may create a second plurality of smart groups based on the corpus of documents and the received user input. Then, the computing platform may generate a second user interface comprising a representation of the second plurality of smart groups.Type: ApplicationFiled: June 3, 2024Publication date: September 26, 2024Inventors: Daniel Wallace Rapp, Brian Sanford Jones, Spencer Bror Koehler
-
Patent number: 12069087Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: GrantFiled: April 24, 2023Date of Patent: August 20, 2024Assignee: GOOGLE LLCInventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
-
Patent number: 12038984Abstract: Aspects of the disclosure relate to using a machine learning system to process a corpus of documents associated with a user to determine a user-specific consequence index. A computing platform may load a corpus of documents associated with a user. Subsequently, the computing platform may create a first plurality of smart groups based on the corpus of documents, and then may generate a first user interface comprising a representation of the first plurality of smart groups. Next, the computing platform may receive user input applying one or more labels to a plurality of documents associated with at least one smart group. Subsequently, the computing platform may create a second plurality of smart groups based on the corpus of documents and the received user input. Then, the computing platform may generate a second user interface comprising a representation of the second plurality of smart groups.Type: GrantFiled: November 17, 2022Date of Patent: July 16, 2024Assignee: Proofpoint, Inc.Inventors: Daniel Wallace Rapp, Brian Sanford Jones, Spencer Bror Koehler
-
Publication number: 20240171610Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive a uniform resource locator (URL). The computing platform may parse and/or tokenize the URL to reduce the URL into a plurality of components. The computing platform may identify human-engineered features of the URL. The computing platform may compute a vector representation of the URL to identify deep learned features of the URL. The computing platform may concatenate the human-engineered features of the URL to the deep learned features of the URL, resulting in a concatenated vector representation. By inputting the concatenated vector representation of the URL to a URL classifier, the computing platform may compute a phish classification score. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: ApplicationFiled: January 30, 2024Publication date: May 23, 2024Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dallan Quass
-
Publication number: 20240121268Abstract: Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign.Type: ApplicationFiled: December 14, 2023Publication date: April 11, 2024Inventors: Zachary Mitchell Abzug, Kevin Patrick Blissett, Brian Sanford Jones
-
Patent number: 11924246Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive a uniform resource locator (URL). The computing platform may parse and/or tokenize the URL to reduce the URL into a plurality of components. The computing platform may identify human-engineered features of the URL. The computing platform may compute a vector representation of the URL to identify deep learned features of the URL. The computing platform may concatenate the human-engineered features of the URL to the deep learned features of the URL, resulting in a concatenated vector representation. By inputting the concatenated vector representation of the URL to a URL classifier, the computing platform may compute a phish classification score. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: GrantFiled: February 1, 2023Date of Patent: March 5, 2024Assignee: Proofpoint, Inc.Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dallan Quass
-
Patent number: 11888895Abstract: Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign.Type: GrantFiled: June 25, 2021Date of Patent: January 30, 2024Assignee: Proofpoint, Inc.Inventors: Zachary Mitchell Abzug, Kevin Patrick Blissett, Brian Sanford Jones
-
Publication number: 20230421607Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive image data of a graphical rendering of a resource available at a uniform resource locator (URL). The computing platform may compute a computer vision vector representation of the image data. The computing platform may compare the computer vision vector representation of the image data to stored numeric vectors representing page elements, resulting in a feature indicating whether the computer vision vector representation of the image data is visually similar to a known page element, and may input the feature to a classifier. The computing platform may receive, from the classifier, a phish classification score indicating a likelihood that the URL is malicious. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: ApplicationFiled: September 12, 2023Publication date: December 28, 2023Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dallan Quass
-
Patent number: 11799905Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive image data of a graphical rendering of a resource available at a uniform resource locator (URL). The computing platform may compute a computer vision vector representation of the image data. The computing platform may compare the computer vision vector representation of the image data to stored numeric vectors representing page elements, resulting in a feature indicating whether the computer vision vector representation of the image data is visually similar to a known page element, and may input the feature to a classifier. The computing platform may receive, from the classifier, a phish classification score indicating a likelihood that the URL is malicious. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: GrantFiled: March 26, 2020Date of Patent: October 24, 2023Assignee: Proofpoint, Inc.Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dallan Quass
-
Publication number: 20230336584Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: ApplicationFiled: April 24, 2023Publication date: October 19, 2023Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
-
Publication number: 20230247033Abstract: Aspects of the disclosure relate to message compliance analysis. A computing platform may access historical messages. The computing platform may pre-process the historical messages to configure the historical messages for use in training a disclaimer model to identify whether or not input messages include a disclaimer. The computing platform may train, using the pre-processed historical messages, the disclaimer model. The computing platform may receive a new message. The computing platform may input, into the disclaimer model, the new message, which may produce a disclaimer score indicating a likelihood that the new message includes a disclaimer. The computing platform may compare the disclaimer score to a disclaimer threshold. Based on identifying that the disclaimer score meets or exceeds the disclaimer threshold, the computing platform may remove, from a set of messages scheduled for compliance review, the new message, and send, to an intended recipient of the new message, the new message.Type: ApplicationFiled: January 25, 2023Publication date: August 3, 2023Inventors: Daniel Wallace Rapp, Michael Paul Jones, Brian Sanford Jones, Andre Turgeon, Xinzi Wu, Alan Wessman
-
Publication number: 20230188566Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive a uniform resource locator (URL). The computing platform may parse and/or tokenize the URL to reduce the URL into a plurality of components. The computing platform may identify human-engineered features of the URL. The computing platform may compute a vector representation of the URL to identify deep learned features of the URL. The computing platform may concatenate the human-engineered features of the URL to the deep learned features of the URL, resulting in a concatenated vector representation. By inputting the concatenated vector representation of the URL to a URL classifier, the computing platform may compute a phish classification score. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: ApplicationFiled: February 1, 2023Publication date: June 15, 2023Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dallan Quass
-
Patent number: 11637859Abstract: A system for detecting whether a file including content is associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: GrantFiled: August 30, 2021Date of Patent: April 25, 2023Assignee: Mandiant, Inc.Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
-
Publication number: 20230104176Abstract: Aspects of the disclosure relate to using a machine learning system to process a corpus of documents associated with a user to determine a user-specific consequence index. A computing platform may load a corpus of documents associated with a user. Subsequently, the computing platform may create a first plurality of smart groups based on the corpus of documents, and then may generate a first user interface comprising a representation of the first plurality of smart groups. Next, the computing platform may receive user input applying one or more labels to a plurality of documents associated with at least one smart group. Subsequently, the computing platform may create a second plurality of smart groups based on the corpus of documents and the received user input. Then, the computing platform may generate a second user interface comprising a representation of the second plurality of smart groups.Type: ApplicationFiled: November 17, 2022Publication date: April 6, 2023Inventors: Daniel Wallace Rapp, Brian Sanford Jones, Spencer Bror Koehler
-
Patent number: 11609989Abstract: Aspects of the disclosure relate to detecting and identifying malicious sites using machine learning. A computing platform may receive a uniform resource locator (URL). The computing platform may parse and/or tokenize the URL to reduce the URL into a plurality of components. The computing platform may identify human-engineered features of the URL. The computing platform may compute a vector representation of the URL to identify deep learned features of the URL. The computing platform may concatenate the human-engineered features of the URL to the deep learned features of the URL, resulting in a concatenated vector representation. By inputting the concatenated vector representation of the URL to a URL classifier, the computing platform may compute a phish classification score. In response to determining that the phish classification score exceeds a first phish classification threshold, the computing platform may cause a cybersecurity server to perform a first action.Type: GrantFiled: March 26, 2020Date of Patent: March 21, 2023Assignee: Proofpoint, Inc.Inventors: Brian Sanford Jones, Zachary Mitchell Abzug, Jeremy Thomas Jordan, Giorgi Kvernadze, Dalian Quass
-
Patent number: 11537668Abstract: Aspects of the disclosure relate to using a machine learning system to process a corpus of documents associated with a user to determine a user-specific consequence index. A computing platform may load a corpus of documents associated with a user. Subsequently, the computing platform may create a first plurality of smart groups based on the corpus of documents, and then may generate a first user interface comprising a representation of the first plurality of smart groups. Next, the computing platform may receive user input applying one or more labels to a plurality of documents associated with at least one smart group. Subsequently, the computing platform may create a second plurality of smart groups based on the corpus of documents and the received user input. Then, the computing platform may generate a second user interface comprising a representation of the second plurality of smart groups.Type: GrantFiled: April 13, 2020Date of Patent: December 27, 2022Assignee: Proofpoint, Inc.Inventors: Daniel Wallace Rapp, Brian Sanford Jones, Spencer Bror Koehler
-
Publication number: 20220070212Abstract: Aspects of the disclosure relate to generating threat intelligence information. A computing platform may receive forensics information corresponding to message attachments. For each message attachment, the computing platform may generate a feature representation. The computing platform may input the feature representations into a neural network, which may result in a numeric representation for each message attachments. The computing platform may apply a clustering algorithm to cluster each message attachments based on the numeric representations, which may result in clustering information. The computing platform may extract, from the clustering information, one or more indicators of compromise indicating that one or more attachments corresponds to a threat campaign.Type: ApplicationFiled: June 25, 2021Publication date: March 3, 2022Inventors: Zachary Mitchell Abzug, Kevin Patrick Blissett, Brian Sanford Jones