Patents by Inventor Carey Stover Nachenberg
Carey Stover Nachenberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11671445Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: GrantFiled: January 18, 2022Date of Patent: June 6, 2023Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Publication number: 20220141249Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: ApplicationFiled: January 18, 2022Publication date: May 5, 2022Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Publication number: 20220119012Abstract: Systems, methods, and non-transitory computer-readable media can detect an occurrence of a condition in an environment based on sensor data captured by a vehicle. A determination is made whether the occurrence of the condition satisfies a threshold associated with a likelihood that a behavior associated with an object in the environment will occur based on an interaction between the condition and the object, wherein the likelihood is based on prior observations of one or more objects. Subsequent to determining that the threshold is satisfied, a vehicle operation that is associated with the likelihood that the behavior associated with the object will occur is performed.Type: ApplicationFiled: October 19, 2020Publication date: April 21, 2022Applicant: Lyft, Inc.Inventors: Alan Agon, Nastaran Ghadar, Yunjian Jiang, Mason Lee, Carlos Alberto De Magalhaes Massera Filho, Carey Stover Nachenberg, Sammy Omari, Ana Sofia Rufino Ferreira, Meng Tao
-
Patent number: 11265344Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: GrantFiled: January 22, 2020Date of Patent: March 1, 2022Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Patent number: 11093607Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes maintaining a first data structure that stores arrays of identifier tuples. Each identifier tuple corresponds to a respective computer security event and includes one or more identifiers for a computing element associated with the computer security event. Each array of identifier tuples corresponds to a respective identifier and only includes identifier tuples that include the corresponding identifier. A second data structure that stores arrays of computer security data is maintained. Each array of computer security data corresponds to a respective identifier tuple stored in the first data structure and only includes computer security data associated with each identifier in the corresponding identifier tuple. A query that specifies a first identifier for a first computing element is received.Type: GrantFiled: August 2, 2018Date of Patent: August 17, 2021Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, William S. Robinson, Shapor Naghibzadeh, Michael Wiacek, Abu Wawda
-
Patent number: 10958534Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for surfacing anomalous network activity on a user interface. An example method provides, for presentation on a user device, a user interface for analyzing network traffic from a customer network. The user interface is populated with network traffic data from the customer network for display to the user. An interactive first filter that is configurable for filtering network traffic based on prevalence of the destination domains of the network traffic is displayed to the user. A first user input configuring the first filter to a first prevalence value is received. In response, the network traffic data is filtered in the user interface to only include network traffic data that has a destination domain that is less prevalent than the first prevalence value.Type: GrantFiled: October 24, 2017Date of Patent: March 23, 2021Assignee: Chronicle LLCInventors: Bernardo Malta Leite Telles, Shapor Naghibzadeh, Carey Stover Nachenberg
-
Publication number: 20200162505Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: ApplicationFiled: January 22, 2020Publication date: May 21, 2020Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Patent number: 10581896Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: GrantFiled: March 8, 2017Date of Patent: March 3, 2020Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Patent number: 10503896Abstract: The subject matter of this specification generally relates to data security. In some implementations, a method includes receiving, from data owners, a first cryptographically secure representation of data to be monitored for data breaches. Each first cryptographically secure representation can include a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner. One or more second cryptographically secure representations of second data records are received from a user. A number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner is determined. A determination is made that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner.Type: GrantFiled: March 17, 2017Date of Patent: December 10, 2019Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Stephen Gillett
-
Patent number: 10469509Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes receiving indicators of compromise from multiple security data providers. Each indicator of compromise can include data specifying one or more characteristics of one or more computer security threats. Each indicator of compromise can be configured to, when processed by a computer, cause the computer to detect the presence of the specified one or more characteristics of the one or more computer security threats. Telemetry data for computing systems of users can be received. The telemetry data can include data describing at least one event detected at the computing system. A determination is made that the telemetry data for a given user includes the one or more characteristics specified by a given indicator of compromise.Type: GrantFiled: December 29, 2016Date of Patent: November 5, 2019Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Shapor Naghibzadeh
-
Patent number: 10284535Abstract: Methods, systems, and apparatus, including a system that includes a secure hardware unit; and a database system including one or more processors; and a computer-readable medium having stored instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving a client request to perform a database operation using first encrypted data as an encrypted value of a field to be operated on by the database operation, where the first encrypted data has been encrypted by a database client using a first encryption key; providing, to the secure hardware unit, a system request for performing one or more data processing operations, the system request including (i) the first encrypted data and (ii) data identifying the first encryption key; and receiving, from the secure hardware unit, output data representing an output of the one or more data processing operations.Type: GrantFiled: December 13, 2016Date of Patent: May 7, 2019Assignee: Chronicle LLCInventor: Carey Stover Nachenberg
-
Publication number: 20190123975Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for surfacing anomalous network activity on a user interface. An example method provides, for presentation on a user device, a user interface for analyzing network traffic from a customer network. The user interface is populated with network traffic data from the customer network for display to the user. An interactive first filter that is configurable for filtering network traffic based on prevalence of the destination domains of the network traffic is displayed to the user. A first user input configuring the first filter to a first prevalence value is received. In response, the network traffic data is filtered in the user interface to only include network traffic data that has a destination domain that is less prevalent than the first prevalence value.Type: ApplicationFiled: October 24, 2017Publication date: April 25, 2019Inventors: Bernardo Malta Leite Telles, Shapor Naghibzadeh, Carey Stover Nachenberg
-
Publication number: 20180268135Abstract: The subject matter of this specification generally relates to data security. In some implementations, a method includes receiving, from data owners, a first cryptographically secure representation of data to be monitored for data breaches. Each first cryptographically secure representation can include a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner. One or more second cryptographically secure representations of second data records are received from a user. A number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner is determined. A determination is made that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner.Type: ApplicationFiled: March 17, 2017Publication date: September 20, 2018Inventors: Carey Stover Nachenberg, Stephen Gillett
-
Publication number: 20180191747Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes receiving indicators of compromise from multiple security data providers. Each indicator of compromise can include data specifying one or more characteristics of one or more computer security threats. Each indicator of compromise can be configured to, when processed by a computer, cause the computer to detect the presence of the specified one or more characteristics of the one or more computer security threats. Telemetry data for computing systems of users can be received. The telemetry data can include data describing at least one event detected at the computing system. A determination is made that the telemetry data for a given user includes the one or more characteristics specified by a given indicator of compromise.Type: ApplicationFiled: December 29, 2016Publication date: July 5, 2018Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Shapor Naghibzadeh
-
Publication number: 20180191770Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: ApplicationFiled: March 8, 2017Publication date: July 5, 2018Inventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Publication number: 20180165470Abstract: Methods, systems, and apparatus, including a system that includes a secure hardware unit; and a database system including one or more processors; and a computer-readable medium having stored instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving a client request to perform a database operation using first encrypted data as an encrypted value of a field to be operated on by the database operation, where the first encrypted data has been encrypted by a database client using a first encryption key; providing, to the secure hardware unit, a system request for performing one or more data processing operations, the system request including (i) the first encrypted data and (ii) data identifying the first encryption key; and receiving, from the secure hardware unit, output data representing an output of the one or more data processing operations.Type: ApplicationFiled: December 13, 2016Publication date: June 14, 2018Inventor: Carey Stover Nachenberg
-
Patent number: 7647362Abstract: Mechanisms for saving and accessing versions of files using indexed content, rather than a system version identifier. Thus, a user may identify a version of a file by its content, rather than using a less descriptive system-assigned version identifier. Accordingly, the user is provided with a more intuitive and therefore efficient mechanism for identifying and accessing different versions of files.Type: GrantFiled: November 29, 2005Date of Patent: January 12, 2010Assignee: Symantec CorporationInventor: Carey Stover Nachenberg