Patents by Inventor Carey Stover Nachenberg

Carey Stover Nachenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11671445
    Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
    Type: Grant
    Filed: January 18, 2022
    Date of Patent: June 6, 2023
    Assignee: Chronicle LLC
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
  • Publication number: 20220141249
    Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
    Type: Application
    Filed: January 18, 2022
    Publication date: May 5, 2022
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
  • Publication number: 20220119012
    Abstract: Systems, methods, and non-transitory computer-readable media can detect an occurrence of a condition in an environment based on sensor data captured by a vehicle. A determination is made whether the occurrence of the condition satisfies a threshold associated with a likelihood that a behavior associated with an object in the environment will occur based on an interaction between the condition and the object, wherein the likelihood is based on prior observations of one or more objects. Subsequent to determining that the threshold is satisfied, a vehicle operation that is associated with the likelihood that the behavior associated with the object will occur is performed.
    Type: Application
    Filed: October 19, 2020
    Publication date: April 21, 2022
    Applicant: Lyft, Inc.
    Inventors: Alan Agon, Nastaran Ghadar, Yunjian Jiang, Mason Lee, Carlos Alberto De Magalhaes Massera Filho, Carey Stover Nachenberg, Sammy Omari, Ana Sofia Rufino Ferreira, Meng Tao
  • Patent number: 11265344
    Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
    Type: Grant
    Filed: January 22, 2020
    Date of Patent: March 1, 2022
    Assignee: Chronicle LLC
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
  • Patent number: 11093607
    Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes maintaining a first data structure that stores arrays of identifier tuples. Each identifier tuple corresponds to a respective computer security event and includes one or more identifiers for a computing element associated with the computer security event. Each array of identifier tuples corresponds to a respective identifier and only includes identifier tuples that include the corresponding identifier. A second data structure that stores arrays of computer security data is maintained. Each array of computer security data corresponds to a respective identifier tuple stored in the first data structure and only includes computer security data associated with each identifier in the corresponding identifier tuple. A query that specifies a first identifier for a first computing element is received.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: August 17, 2021
    Assignee: Chronicle LLC
    Inventors: Carey Stover Nachenberg, William S. Robinson, Shapor Naghibzadeh, Michael Wiacek, Abu Wawda
  • Patent number: 10958534
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for surfacing anomalous network activity on a user interface. An example method provides, for presentation on a user device, a user interface for analyzing network traffic from a customer network. The user interface is populated with network traffic data from the customer network for display to the user. An interactive first filter that is configurable for filtering network traffic based on prevalence of the destination domains of the network traffic is displayed to the user. A first user input configuring the first filter to a first prevalence value is received. In response, the network traffic data is filtered in the user interface to only include network traffic data that has a destination domain that is less prevalent than the first prevalence value.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: March 23, 2021
    Assignee: Chronicle LLC
    Inventors: Bernardo Malta Leite Telles, Shapor Naghibzadeh, Carey Stover Nachenberg
  • Publication number: 20200162505
    Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
    Type: Application
    Filed: January 22, 2020
    Publication date: May 21, 2020
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
  • Patent number: 10581896
    Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
    Type: Grant
    Filed: March 8, 2017
    Date of Patent: March 3, 2020
    Assignee: Chronicle LLC
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
  • Patent number: 10503896
    Abstract: The subject matter of this specification generally relates to data security. In some implementations, a method includes receiving, from data owners, a first cryptographically secure representation of data to be monitored for data breaches. Each first cryptographically secure representation can include a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner. One or more second cryptographically secure representations of second data records are received from a user. A number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner is determined. A determination is made that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: December 10, 2019
    Assignee: Chronicle LLC
    Inventors: Carey Stover Nachenberg, Stephen Gillett
  • Patent number: 10469509
    Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes receiving indicators of compromise from multiple security data providers. Each indicator of compromise can include data specifying one or more characteristics of one or more computer security threats. Each indicator of compromise can be configured to, when processed by a computer, cause the computer to detect the presence of the specified one or more characteristics of the one or more computer security threats. Telemetry data for computing systems of users can be received. The telemetry data can include data describing at least one event detected at the computing system. A determination is made that the telemetry data for a given user includes the one or more characteristics specified by a given indicator of compromise.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: November 5, 2019
    Assignee: Chronicle LLC
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Shapor Naghibzadeh
  • Patent number: 10284535
    Abstract: Methods, systems, and apparatus, including a system that includes a secure hardware unit; and a database system including one or more processors; and a computer-readable medium having stored instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving a client request to perform a database operation using first encrypted data as an encrypted value of a field to be operated on by the database operation, where the first encrypted data has been encrypted by a database client using a first encryption key; providing, to the secure hardware unit, a system request for performing one or more data processing operations, the system request including (i) the first encrypted data and (ii) data identifying the first encryption key; and receiving, from the secure hardware unit, output data representing an output of the one or more data processing operations.
    Type: Grant
    Filed: December 13, 2016
    Date of Patent: May 7, 2019
    Assignee: Chronicle LLC
    Inventor: Carey Stover Nachenberg
  • Publication number: 20190123975
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for surfacing anomalous network activity on a user interface. An example method provides, for presentation on a user device, a user interface for analyzing network traffic from a customer network. The user interface is populated with network traffic data from the customer network for display to the user. An interactive first filter that is configurable for filtering network traffic based on prevalence of the destination domains of the network traffic is displayed to the user. A first user input configuring the first filter to a first prevalence value is received. In response, the network traffic data is filtered in the user interface to only include network traffic data that has a destination domain that is less prevalent than the first prevalence value.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Bernardo Malta Leite Telles, Shapor Naghibzadeh, Carey Stover Nachenberg
  • Publication number: 20180268135
    Abstract: The subject matter of this specification generally relates to data security. In some implementations, a method includes receiving, from data owners, a first cryptographically secure representation of data to be monitored for data breaches. Each first cryptographically secure representation can include a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner. One or more second cryptographically secure representations of second data records are received from a user. A number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner is determined. A determination is made that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner.
    Type: Application
    Filed: March 17, 2017
    Publication date: September 20, 2018
    Inventors: Carey Stover Nachenberg, Stephen Gillett
  • Publication number: 20180191747
    Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes receiving indicators of compromise from multiple security data providers. Each indicator of compromise can include data specifying one or more characteristics of one or more computer security threats. Each indicator of compromise can be configured to, when processed by a computer, cause the computer to detect the presence of the specified one or more characteristics of the one or more computer security threats. Telemetry data for computing systems of users can be received. The telemetry data can include data describing at least one event detected at the computing system. A determination is made that the telemetry data for a given user includes the one or more characteristics specified by a given indicator of compromise.
    Type: Application
    Filed: December 29, 2016
    Publication date: July 5, 2018
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Shapor Naghibzadeh
  • Publication number: 20180191770
    Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
    Type: Application
    Filed: March 8, 2017
    Publication date: July 5, 2018
    Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
  • Publication number: 20180165470
    Abstract: Methods, systems, and apparatus, including a system that includes a secure hardware unit; and a database system including one or more processors; and a computer-readable medium having stored instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving a client request to perform a database operation using first encrypted data as an encrypted value of a field to be operated on by the database operation, where the first encrypted data has been encrypted by a database client using a first encryption key; providing, to the secure hardware unit, a system request for performing one or more data processing operations, the system request including (i) the first encrypted data and (ii) data identifying the first encryption key; and receiving, from the secure hardware unit, output data representing an output of the one or more data processing operations.
    Type: Application
    Filed: December 13, 2016
    Publication date: June 14, 2018
    Inventor: Carey Stover Nachenberg
  • Patent number: 7647362
    Abstract: Mechanisms for saving and accessing versions of files using indexed content, rather than a system version identifier. Thus, a user may identify a version of a file by its content, rather than using a less descriptive system-assigned version identifier. Accordingly, the user is provided with a more intuitive and therefore efficient mechanism for identifying and accessing different versions of files.
    Type: Grant
    Filed: November 29, 2005
    Date of Patent: January 12, 2010
    Assignee: Symantec Corporation
    Inventor: Carey Stover Nachenberg