Patents by Inventor Gregor R. Bonin
Gregor R. Bonin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11928245Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further websites that can be automatically crawled by the system to detect further PII data.Type: GrantFiled: January 13, 2023Date of Patent: March 12, 2024Assignee: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Patent number: 11909846Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: GrantFiled: June 22, 2022Date of Patent: February 20, 2024Assignee: Early Warning Services, LLCInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Publication number: 20230385451Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further websites that can be automatically crawled by the system to detect further PII data.Type: ApplicationFiled: April 17, 2023Publication date: November 30, 2023Applicant: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Publication number: 20230289475Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further websites that can be automatically crawled by the system to detect further PII data.Type: ApplicationFiled: January 13, 2023Publication date: September 14, 2023Applicant: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Patent number: 11630918Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.Type: GrantFiled: September 6, 2019Date of Patent: April 18, 2023Assignee: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Patent number: 11556671Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.Type: GrantFiled: September 1, 2020Date of Patent: January 17, 2023Assignee: Early Warning Sendees, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Publication number: 20220321681Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: ApplicationFiled: June 22, 2022Publication date: October 6, 2022Applicant: Early Warning Services, LLCInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Patent number: 11388256Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: GrantFiled: February 18, 2020Date of Patent: July 12, 2022Assignee: Early Warning Services, LLCInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Publication number: 20200401728Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.Type: ApplicationFiled: September 1, 2020Publication date: December 24, 2020Applicant: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Publication number: 20200259925Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: ApplicationFiled: February 18, 2020Publication date: August 13, 2020Applicant: Early Warning Services, LLCInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Patent number: 10599872Abstract: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PO) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.Type: GrantFiled: February 4, 2019Date of Patent: March 24, 2020Assignee: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Patent number: 10594833Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: GrantFiled: March 12, 2018Date of Patent: March 17, 2020Assignee: Early Warning Services, LLCInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Publication number: 20200004989Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.Type: ApplicationFiled: September 6, 2019Publication date: January 2, 2020Applicant: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Publication number: 20190266355Abstract: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PO) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.Type: ApplicationFiled: February 4, 2019Publication date: August 29, 2019Applicant: Early Warning Services, LLCInventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Patent number: 10268840Abstract: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.Type: GrantFiled: August 15, 2016Date of Patent: April 23, 2019Assignee: XOR Data Exchange, Inc.Inventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R Bonin, Michael Cook
-
Publication number: 20180367639Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: ApplicationFiled: March 12, 2018Publication date: December 20, 2018Applicant: XOR Data Exchange, Inc.Inventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Patent number: 9917920Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the limit. In some embodiments, there may be separate limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: GrantFiled: February 24, 2015Date of Patent: March 13, 2018Assignee: XOR DATA EXCHANGE, INCInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Publication number: 20170161746Abstract: In certain embodiments, a compromised data exchange system may include a memory, an input to receive encrypted personal identifying information (PII), and a processor coupled to the input and the memory. The a processor coupled to the interface and the memory, the processor configured to unencrypt the PII and re-encrypt the PII to produce re-encrypted PII data using a different encryption key for each field and to store the re-encrypted PII data as compromised data in the memory. In some embodiments, the processor may be configured to receive PII data to be tested, may unencrypt and re-encrypted the received PII data using the different encryption keys, compare the encrypted PII data to the compromised data, and determine a risk score based in part on the comparison. The risk score may be sent to a destination device, which may be the source of the PII data to be tested.Type: ApplicationFiled: December 4, 2015Publication date: June 8, 2017Applicant: XOR Data Exchange, IncInventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
-
Publication number: 20170161520Abstract: In some embodiments, a compromised data exchange system may include an interface configured to couple to a network, a processor, and a memory accessible to the processor. The memory may be configured to store instructions that, when executed, cause the processor to extract data from one or more websites using a crawler, detect portions within the data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and to compare a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. The instructions may further cause the processor to selectively assign a risk score to a data item within the database in response to determining the match using a risk scoring module.Type: ApplicationFiled: August 15, 2016Publication date: June 8, 2017Applicant: XOR Data Exchange, Inc.Inventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
-
Publication number: 20160248881Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the limit. In some embodiments, there may be separate limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.Type: ApplicationFiled: February 24, 2015Publication date: August 25, 2016Applicant: XOR DATA EXCHANGE, INCInventors: Michael Cook, Gregor R. Bonin