Patents by Inventor Jon Oberheide
Jon Oberheide has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12010513Abstract: Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.Type: GrantFiled: May 28, 2020Date of Patent: June 11, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Michael Hanley, Jon Oberheide
-
Publication number: 20240048560Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: September 28, 2023Publication date: February 8, 2024Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11831642Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: April 20, 2021Date of Patent: November 28, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11832099Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.Type: GrantFiled: September 30, 2021Date of Patent: November 28, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Jon Oberheide, Douglas Song, Adam Goodman
-
Patent number: 11658962Abstract: A system and method of implementing an API of an authentication service includes implementing a confirmation API, wherein the implementing includes: initiating a confirmation API request based on receiving an access request, wherein the confirmation API request operates to perform an authentication of a requestor making the access request; identifying the requestor based on a search of the requestor via the confirmation API; identifying, by one or more API endpoints of the remote authentication service: (i) a subscriber account of the subscriber maintained by the remote authentication service and (ii) identifying a user device of the requestor that is enrolled with the subscriber account based on the confirmation API request; transmitting a confirmation request to the user device; obtaining from the user device a response to the confirmation request and presenting the response to the confirmation request to the subscriber; and granting or denying the access request.Type: GrantFiled: October 29, 2019Date of Patent: May 23, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Jon Oberheide, Adam Goodman, Rich Smith, Chris Czub
-
Patent number: 11341475Abstract: A method of completing a transaction that requires authorization by an authority agent includes registering an authority device as associated with the authority agent, receiving a transaction request from a service provider; pushing an authentication notification to the authenticating application of the authority device; displaying the authentication notification, including a prompt to supply agent verification data, on the authority device; collecting and verifying the agent verification data; in response to verification of the agent verification data, transmitting an authority agent response from the authority device to the authentication platform, and, at the authentication platform, authenticating the authority agent response; and in response to authenticating the authority agent response, transmitting a transaction confirmation from the authentication platform to the service provider.Type: GrantFiled: May 12, 2020Date of Patent: May 24, 2022Assignee: CISCO TECHNOLOGY, INCInventors: Jon Oberheide, Omar Abduljaber, Boyang Zhu
-
Patent number: 11323441Abstract: A system and method that include receiving a service provider identity request through a protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; determining a proxy identity assertion based on the identity assertion; and transmitting the proxy identity assertion to the service provider.Type: GrantFiled: July 21, 2020Date of Patent: May 3, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Jon Oberheide, Douglas Song
-
Publication number: 20220022039Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.Type: ApplicationFiled: September 30, 2021Publication date: January 20, 2022Inventors: Jon Oberheide, Douglas Song, Adam Goodman
-
Publication number: 20210385242Abstract: A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web page using one or more features and attributes of an entity; and implementing the phishing assessment using the pseudo domain name and pseudoweb page.Type: ApplicationFiled: August 23, 2021Publication date: December 9, 2021Inventor: Jon Oberheide
-
Patent number: 11172361Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.Type: GrantFiled: September 21, 2018Date of Patent: November 9, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Jon Oberheide, Douglas Song, Adam Goodman
-
Patent number: 11140191Abstract: A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web page using one or more features and attributes of an entity; and implementing the phishing assessment using the pseudo domain name and pseudo web page.Type: GrantFiled: November 4, 2019Date of Patent: October 5, 2021Assignee: CISCO TECHNOLOGY, INC.Inventor: Jon Oberheide
-
Publication number: 20210258307Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: April 20, 2021Publication date: August 19, 2021Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11057427Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.Type: GrantFiled: October 31, 2019Date of Patent: July 6, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Jordan Wright, Jon Oberheide
-
Patent number: 11019057Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: January 14, 2020Date of Patent: May 25, 2021Assignee: DUO SECURITY, INC.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Publication number: 20200351268Abstract: A system and method that include receiving a service provider identity request through a protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; determining a proxy identity assertion based on the identity assertion; and transmitting the proxy identity assertion to the service provider.Type: ApplicationFiled: July 21, 2020Publication date: November 5, 2020Inventors: Jon Oberheide, Douglas Song
-
Publication number: 20200288315Abstract: Systems and methods are provided that include: accessing implicit authentication data from a possession factor associated with an authorized user; at the possession factor or at an authentication platform: generating a possession confidence level using the implicit authentication data, the possession confidence level being one of a plurality of possession confidence levels, the possession confidence level indicating a likelihood that the possession factor is possessed by the authorized user; identifying, among a plurality of varying authentication requirements, an authentication requirement for the transaction based on the possession confidence level, the authentication requirement defines a process or action to prove authority to perform the transaction or a process or action to prove an identity of a user attempting to perform the transaction; and implementing the authentication requirement for the transaction.Type: ApplicationFiled: May 28, 2020Publication date: September 10, 2020Inventors: Michael Hanley, Jon Oberheide
-
Patent number: 10764286Abstract: A system and method that include receiving a service provider identity request through a protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; determining a proxy identity assertion based on the identity assertion; and transmitting the proxy identity assertion to the service provider.Type: GrantFiled: December 20, 2018Date of Patent: September 1, 2020Inventors: Jon Oberheide, Douglas Song
-
Publication number: 20200273033Abstract: A method of completing a transaction that requires authorization by an authority agent includes registering an authority device as associated with the authority agent, receiving a transaction request from a service provider; pushing an authentication notification to the authenticating application of the authority device; displaying the authentication notification, including a prompt to supply agent verification data, on the authority device; collecting and verifying the agent verification data; in response to verification of the agent verification data, transmitting an authority agent response from the authority device to the authentication platform, and, at the authentication platform, authenticating the authority agent response; and in response to authenticating the authority agent response, transmitting a transaction confirmation from the authentication platform to the service provider.Type: ApplicationFiled: May 12, 2020Publication date: August 27, 2020Inventors: Jon Oberheide, Omar Abduljaber, Boyang Zhu
-
Patent number: 10742626Abstract: A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password authentication using a first symmetric cryptographic key; generating, at an authenticating device, a second symmetric cryptographic key; transmitting, at the authenticating device, the second symmetric cryptographic key to the multi-factor authentication platform; configuring the multi-factor authentication platform and the authenticating device to disable authentication that uses the first symmetric cryptographic key; and configuring the multi-factor authentication platform and the authenticating device to enable authentication that uses the second symmetric cryptographic key.Type: GrantFiled: July 25, 2018Date of Patent: August 11, 2020Inventors: Jon Oberheide, Adam Goodman
-
Patent number: 10706421Abstract: A method of completing a transaction that requires authorization by an authority agent includes registering an authority device as associated with the authority agent, receiving a transaction request from a service provider; pushing an authentication notification to the authenticating application of the authority device; displaying the authentication notification, including a prompt to supply agent verification data, on the authority device; collecting and verifying the agent verification data; in response to verification of the agent verification data, transmitting an authority agent response from the authority device to the authentication platform, and, at the authentication platform, authenticating the authority agent response; and in response to authenticating the authority agent response, transmitting a transaction confirmation from the authentication platform to the service provider.Type: GrantFiled: September 12, 2019Date of Patent: July 7, 2020Inventors: Jon Oberheide, Omar Abduljaber, Boyang Zhu