Patents by Inventor Christopher B. Cullison
Christopher B. Cullison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11418527Abstract: A computer-implemented method including scanning, by one or more processors, data that is maintained on one or more social networks, identifying, one or more social entities associated with the scanned data, determining a risk score for each of the one or more social entities, analyzing the scanned data using one or more machine learning techniques, assigning a rating to each of the one or more social entities based on the determined risk score and the analyzed data, and determining, based on the rating assigned to at least one of the one or more social entities that the at least one social entity is a security risk.Type: GrantFiled: August 17, 2018Date of Patent: August 16, 2022Assignee: ZeroFOX, IncInventors: James Foster, Christopher B. Cullison, Michael Price, Zachary Michael Allen
-
Patent number: 11403400Abstract: A computer-implemented method including scanning, by one or more processors, data that is maintained on one or more social network profiles of a protected social entity, identifying, one or more social entities associated with the scanned data, determining a risk score for each of the one or more social entities, analyzing the scanned data using one or more machine learning techniques, assigning a rating to each of the one or more social entities based on the determined risk score and the analyzed data, and determining, based on the rating assigned to at least one of the one or more social entities that the at least one social entity is a security risk to the protected social entity.Type: GrantFiled: August 31, 2018Date of Patent: August 2, 2022Assignee: ZeroFOX, Inc.Inventors: James Foster, Christopher B. Cullison, Michael Price, Zachary Michael Allen
-
Patent number: 11394722Abstract: A computer implemented method includes receiving instructions from a user for identifying data on one or more social networks, wherein the instructions received from the user comprise one or more conditions and one or more actions, identifying, on the one or more social networks, data that is associated with one or more social entities, determining one or more characteristics of the identified data, determining, based on the one or more characteristics of the identified data, that the identified data meets one or more conditions for identifying data specified in the instructions received from the user, in response to determining that the identified data meets one or more conditions specified in the instructions received from the user, performing one or more actions specified in the instructions received from the user.Type: GrantFiled: April 3, 2018Date of Patent: July 19, 2022Assignee: ZeroFOX, Inc.Inventors: Michael Price, James Foster, Christopher B. Cullison
-
Patent number: 11374956Abstract: A computer-implemented method including scanning, by one or more processors, data that is maintained on one or more social networks, identifying, one or more social entities associated with the scanned data, determining a risk score for each of the one or more social entities, analyzing the scanned data using one or more machine learning techniques, assigning a rating to each of the one or more social entities based on the determined risk score and the analyzed data, and determining, based on the rating assigned to at least one of the one or more social entities that the at least one social entity is a security risk.Type: GrantFiled: August 17, 2018Date of Patent: June 28, 2022Assignee: ZeroFOX, IncInventors: James Foster, Christopher B. Cullison, Michael Price, Zachary Michael Allen
-
Patent number: 11256812Abstract: A computer implemented method including generating, by one or more processors, an activation request, receiving, from a user device, an activation confirmation, configuring a protection account specific to the user, where configuring the protection account comprises, identifying one or more of the user's social network accounts, authenticating one or more of the user's social network accounts, and generating a protection portal for the user, providing a link to the protection portal to the user, and providing one or more alerts to the user on the protection portal, wherein the one or more alerts identify security risks associated with one or more of the user's social network accounts.Type: GrantFiled: January 30, 2018Date of Patent: February 22, 2022Assignee: ZeroFOX, Inc.Inventors: Michael Price, James Foster, Christopher B. Cullison
-
Patent number: 11165801Abstract: A computer-implemented method includes scanning data maintained on multiple social networks, where, scanning includes identifying a first set of data that is associated with a protected social entity. Scanning data maintained on one or more additional platforms, where, scanning includes identifying a second set of data that is associated with the protected social entity. Scanning data is performed on a continuous basis without user initiation. One or more characteristics of the first set and second set of identified data are determined, and a reference to the identified data, that indicates the characteristic, is generated for each of the one or more characteristics. The one or more generated references of the first set of identified data is compared to the one or more generated references of the second set of identified data. A correlation score is determined based on the comparison, and a threat level indicator is generated based on the determined correlation score.Type: GrantFiled: August 15, 2018Date of Patent: November 2, 2021Assignee: ZeroFOX, Inc.Inventors: Christopher B. Cullison, Michael Price, James Foster
-
Patent number: 11134097Abstract: A computer implemented method includes receiving instructions from a user, where the instructions received from the user comprise one or more conditions, scanning data that is maintained across multiple social networks, where scanning comprises identifying data that is associated with a protected social entity, determining that the identified data meets one or more conditions specified in the instructions received from the user, in response to determining that the identified data meets one or more conditions specified in the instructions, determining whether to request a particular social network to remove the identified data by comparing the identified data to terms of service data of each of the one or more social networks, based on the comparison, determining that the identified data is not permitted on at least one social network, and submitting a request for the removal of the identified data to the at least one social network.Type: GrantFiled: October 23, 2018Date of Patent: September 28, 2021Assignee: ZeroFOX, Inc.Inventors: James Foster, Christopher B. Cullison, Michael Price
-
Patent number: 10999130Abstract: A computer-implemented method includes generating, by one or more processors, a hyperlink targeting a Uniform Resource Locator (URL), detecting a selection of the generated hyperlink by one or more social entities across one or more social networks, generating a report, wherein the generated report includes analytical details regarding the selection of the generated hyperlink by the one or more social entities, and providing the generated report to a user associated with a protected social entity.Type: GrantFiled: November 18, 2019Date of Patent: May 4, 2021Assignee: ZeroFOX, Inc.Inventors: James Foster, Evan Blair, Christopher B. Cullison, Robert Francis
-
Patent number: 10868824Abstract: A computer-implemented method includes identifying, by one or more processors, a first user associated with an organization, identifying one or more social network accounts associated with the first user, identifying a second user associated with the organization, identifying one or more social network accounts associated with the second user, generating a protection portal for the organization, providing a link to the protection portal for the organization to a third user, and providing one or more alerts to the third user associated with the organization, wherein the one or more alerts identify security risks associated with one or more of the first or second user's social network accounts.Type: GrantFiled: July 31, 2018Date of Patent: December 15, 2020Assignee: ZeroFOX, Inc.Inventors: Christopher B. Cullison, Michael Price, James Foster
-
Publication number: 20200092164Abstract: A computer-implemented method includes generating, by one or more processors, a hyperlink targeting a Uniform Resource Locator (URL), detecting a selection of the generated hyperlink by one or more social entities across one or more social networks, generating a report, wherein the generated report includes analytical details regarding the selection of the generated hyperlink by the one or more social entities, and providing the generated report to a user associated with a protected social entity.Type: ApplicationFiled: November 18, 2019Publication date: March 19, 2020Applicant: ZeroFOX, Inc.Inventors: James Foster, Evan Blair, Christopher B. Cullison, Robert Francis
-
Patent number: 10516567Abstract: A computer-implemented method includes generating, by one or more processors, a hyperlink targeting a Uniform Resource Locator (URL), detecting a selection of the generated hyperlink by one or more social entities across one or more social networks, generating a report, wherein the generated report includes analytical details regarding the selection of the generated hyperlink by the one or more social entities, and providing the generated report to a user associated with a protected social entity.Type: GrantFiled: July 11, 2016Date of Patent: December 24, 2019Assignee: ZeroFOX, Inc.Inventors: James Foster, Evan Blair, Christopher B. Cullison, Robert Francis
-
Patent number: 10491623Abstract: A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks is scanned, and the security settings data associated with the one or more profiles of the protected social entity is assessed. A first security risk score for the protected social entity is determined based on the assessment of the security settings data, and the first security risk score is provided to the protected social entity.Type: GrantFiled: January 9, 2017Date of Patent: November 26, 2019Assignee: ZeroFOX, Inc.Inventors: James C. Foster, Evan Blair, Christopher B. Cullison, Robert Francis
-
Publication number: 20190124109Abstract: A computer implemented method includes receiving instructions from a user, where the instructions received from the user comprise one or more conditions, scanning data that is maintained across multiple social networks, where scanning comprises identifying data that is associated with a protected social entity, determining that the identified data meets one or more conditions specified in the instructions received from the user, in response to determining that the identified data meets one or more conditions specified in the instructions, determining whether to request a particular social network to remove the identified data by comparing the identified data to terms of service data of each of the one or more social networks, based on the comparison, determining that the identified data is not permitted on at least one social network, and submitting a request for the removal of the identified data to the at least one social network.Type: ApplicationFiled: October 23, 2018Publication date: April 25, 2019Inventors: James Foster, Christopher B. Cullison, Michael Price
-
Publication number: 20190068632Abstract: A computer-implemented method including scanning, by one or more processors, data that is maintained on one or more social networks, identifying, one or more social entities associated with the scanned data, determining a risk score for each of the one or more social entities, analyzing the scanned data using one or more machine learning techniques, assigning a rating to each of the one or more social entities based on the determined risk score and the analyzed data, and determining, based on the rating assigned to at least one of the one or more social entities that the at least one social entity is a security risk.Type: ApplicationFiled: August 17, 2018Publication date: February 28, 2019Inventors: James Foster, Christopher B. Cullison, Michael Price, Zachary Michael Allen
-
Publication number: 20190065748Abstract: A computer-implemented method including scanning, by one or more processors, data that is maintained on one or more social network profiles of a protected social entity, identifying, one or more social entities associated with the scanned data, determining a risk score for each of the one or more social entities, analyzing the scanned data using one or more machine learning techniques, assigning a rating to each of the one or more social entities based on the determined risk score and the analyzed data, and determining, based on the rating assigned to at least one of the one or more social entities that the at least one social entity is a security risk to the protected social entity.Type: ApplicationFiled: August 31, 2018Publication date: February 28, 2019Inventors: James Foster, Christopher B. Cullison, Michael Price, Zachary Michael Allen
-
Publication number: 20190058721Abstract: A computer-implemented method includes scanning data maintained on multiple social networks, where, scanning includes identifying a first set of data that is associated with a protected social entity. Scanning data maintained on one or more additional platforms, where, scanning includes identifying a second set of data that is associated with the protected social entity. Scanning data is performed on a continuous basis without user initiation. One or more characteristics of the first set and second set of identified data are determined, and a reference to the identified data, that indicates the characteristic, is generated for each of the one or more characteristics. The one or more generated references of the first set of identified data is compared to the one or more generated references of the second set of identified data. A correlation score is determined based on the comparison, and a threat level indicator is generated based on the determined correlation score.Type: ApplicationFiled: August 15, 2018Publication date: February 21, 2019Inventors: Christopher B. Cullison, Michael Price, James Foster
-
Publication number: 20190036960Abstract: A computer-implemented method includes identifying, by one or more processors, a first user associated with an organization, identifying one or more social network accounts associated with the first user, identifying a second user associated with the organization, identifying one or more social network accounts associated with the second user, generating a protection portal for the organization, providing a link to the protection portal for the organization to a third user, and providing one or more alerts to the third user associated with the organization, wherein the one or more alerts identify security risks associated with one or more of the first or second user's social network accounts.Type: ApplicationFiled: July 31, 2018Publication date: January 31, 2019Inventors: Christopher B. Cullison, Michael Price, James Foster
-
Publication number: 20190036937Abstract: A computer-implemented method includes receiving, by one or more processors, instructions from a user, wherein the received instructions identify one or more conditions and one or more actions, scanning, by one or more processors, data that is posted to one or more social network pages associated with a corporate entity, determining that the scanned data meets at least one of the one or more conditions of the received instructions, and in response to determining that the scanned data meets at least one of the one or more conditions of the received instructions, performing one or more actions.Type: ApplicationFiled: July 31, 2018Publication date: January 31, 2019Inventors: Christopher B. Cullison, Michael Price, James Foster
-
Publication number: 20190014148Abstract: A computer-implemented method includes scanning, by one or more processors, data that is maintained on one or more social networks, analyzing the scanned data using one or more machine learning techniques, generating custom content associated with a target social entity, initiating interaction with the target social entity, where initiating interaction with the target social entity includes, posting, by the one or more processors, a form of the generated custom content associated with the target social entity to one or more of the target social entity's social networks.Type: ApplicationFiled: April 3, 2018Publication date: January 10, 2019Inventors: James Foster, Michael Price, Christopher B. Cullison, Philip Tully, John Jefferson Seymour, III
-
Publication number: 20180288070Abstract: A computer implemented method includes receiving instructions from a user for identifying data on one or more social networks, wherein the instructions received from the user comprise one or more conditions and one or more actions, identifying, on the one or more social networks, data that is associated with one or more social entities, determining one or more characteristics of the identified data, determining, based on the one or more characteristics of the identified data, that the identified data meets one or more conditions for identifying data specified in the instructions received from the user, in response to determining that the identified data meets one or more conditions specified in the instructions received from the user, performing one or more actions specified in the instructions received from the user.Type: ApplicationFiled: April 3, 2018Publication date: October 4, 2018Inventors: Michael Price, James Foster, Christopher B. Cullison