Patents by Inventor Jordan Wright

Jordan Wright has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240052366
    Abstract: A nucleotide sequence encoding the RNA genome of a lentiviral vector, wherein the major splice donor site in the RNA genome of the lentiviral vector is inactivated, and wherein the cryptic splice donor site 3? to the major splice donor site is inactivated.
    Type: Application
    Filed: February 4, 2021
    Publication date: February 15, 2024
    Inventors: Daniel Farley, Jordan Wright
  • Patent number: 11729214
    Abstract: Disclosed herein are systems and methods that may generate so-called “honey credentials” that are transmitted to a “phishing” website, and are then stored into a honey credential database. The honey credentials appear to be valid credentials, but whenever a bad actor attempts to access an enterprise using the honey credentials, security appliances the enterprise may update the records of the honey credential database to include one or more unique identifiers for each bad actor device that attempts to access the enterprise network using the honey credentials. A server may automatically query the honey credential database to identify other accounts that have been accessed by devices that used the honey credentials to access the enterprise. The server may then flag the accounts and restrict their functionality.
    Type: Grant
    Filed: August 26, 2021
    Date of Patent: August 15, 2023
    Assignee: United Services Automobile Association (USAA)
    Inventors: Jordan Wright, William Jennings Woodson, Justin Gray
  • Publication number: 20230183742
    Abstract: The present invention provides novel methods for producing a viral vector. Corresponding viral vector production systems and uses are also provided.
    Type: Application
    Filed: May 14, 2021
    Publication date: June 15, 2023
    Inventors: Rui Andre Saraiva Raposo, Charles Moore-Kelly, Jordan Wright, Daniel Farley
  • Publication number: 20230118587
    Abstract: The present invention provides a lentiviral vector genome comprising at least one modified viral cis-acting sequence, wherein at least one internal open reading frame (ORF) in the viral cis-acting sequence is disrupted.
    Type: Application
    Filed: March 11, 2021
    Publication date: April 20, 2023
    Inventor: Jordan Wright
  • Publication number: 20220348958
    Abstract: A modified U1 snRNA, wherein said modified U1 snRNA has been modified to bind to a nucleotide sequence within the packaging region of a lentiviral vector genome sequence.
    Type: Application
    Filed: July 23, 2020
    Publication date: November 3, 2022
    Inventors: Daniel Farley, Jordan Wright
  • Patent number: 11316895
    Abstract: Disclosed herein are systems and methods that may generate so-called “honey credentials” that are transmitted to a “phishing” website, and are then stored into a honey credential database. The honey credentials appear to be valid credentials, but whenever a bad actor attempts to access an enterprise using the honey credentials, security appliances the enterprise may update the records of the honey credential database to include one or more unique identifiers for each bad actor device that attempts to access the enterprise network using the honey credentials. A server may automatically query the honey credential database to identify other accounts that have been accessed by devices that used the honey credentials to access the enterprise. The server may then flag the accounts and restrict their functionality.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: April 26, 2022
    Assignee: United Services Automobile Association (USAA)
    Inventors: Jordan Wright, William Jennings Woodson, Justin Sommers Gray
  • Patent number: 11057427
    Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: July 6, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jordan Wright, Jon Oberheide
  • Publication number: 20200067979
    Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.
    Type: Application
    Filed: October 31, 2019
    Publication date: February 27, 2020
    Inventors: Jordan Wright, Jon Oberheide
  • Patent number: 10558797
    Abstract: A system and method includes at an authentication platform that is implemented via one or more computing servers: identifying compromised credential data, wherein compromised credential data comprise compromised credentials for one or more compromised accounts that have been exposed to a malicious actor via an illegitimate method, the compromised credentials including credentials that are useable for authentication to or for accessing the one or more compromised accounts; testing the compromised credentials, wherein testing compromised credentials includes using the compromised credentials to determine a useablility of the compromised credentials to attack one or more different accounts from the one or more compromised accounts; and modifying account access associated with one or more of (i) the one or more compromised accounts and (ii) the one or more different accounts.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: February 11, 2020
    Inventors: Jordan Wright, Jon Oberheide
  • Patent number: 10498761
    Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: December 3, 2019
    Inventors: Jordan Wright, Jon Oberheide
  • Patent number: 10193923
    Abstract: Systems and methods for mitigating cyber intrusions includes: receiving target domain input, wherein the target domain input comprises a domain name associated with a target entity or target entity data that is useable to generate phishing attack domain names; using the target domain name input to generate the phishing attack domain names, wherein the phishing attack domain names include a plurality of domain names each having a phishing value comprising a likelihood or a probability of being used in a phishing campaign against the digital resources, where the likelihood or the probability satisfies a predetermined phishing value threshold; arranging the phishing attack domain names in a hierarchical order; and implementing one or more digital resources security protocols that mitigates the likelihood or the probability that selected domain names of the phishing attack domain names may be used in the phishing campaign against the digital resources.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: January 29, 2019
    Assignee: Duo Security, Inc.
    Inventors: Jordan Wright, Jon Oberheide
  • Publication number: 20180063190
    Abstract: Systems and methods for hindering cyber-attacks include: modifying a target website of a remote service provider, wherein modifying the target website includes: reconfiguring a structure of the target website to include a tattler, wherein when the tattler is executed at a non-authorized copy of the target website, the tattler is configured to transmit to a cyber-attack mitigation platform tattler data associated with the non-authorized copy of the target website; receiving the tattler data, wherein the tattler data includes website monitoring data, wherein the website monitoring data comprises a URL of the non-authorized copy of the target website; using the website monitoring data to evaluate the non-authorized copy of the target website, wherein the evaluating includes identifying whether the non-authorized copy of the target website comprises an attack website; and implementing one or more attack mitigation protocols when the non-authorized copy of the target website comprises the attack website.
    Type: Application
    Filed: August 22, 2017
    Publication date: March 1, 2018
    Inventors: Jordan Wright, Jon Oberheide
  • Publication number: 20180046796
    Abstract: A system and method includes at an authentication platform that is implemented via one or more computing servers: identifying compromised credential data, wherein compromised credential data comprise compromised credentials for one or more compromised accounts that have been exposed to a malicious actor via an illegitimate method, the compromised credentials including credentials that are useable for authentication to or for accessing the one or more compromised accounts; testing the compromised credentials, wherein testing compromised credentials includes using the compromised credentials to determine a useablility of the compromised credentials to attack one or more different accounts from the one or more compromised accounts; and modifying account access associated with one or more of (i) the one or more compromised accounts and (ii) the one or more different accounts.
    Type: Application
    Filed: July 26, 2017
    Publication date: February 15, 2018
    Inventors: Jordan Wright, Jon Oberheide
  • Publication number: 20180027013
    Abstract: Systems and methods for mitigating cyber intrusions includes: receiving target domain input, wherein the target domain input comprises a domain name associated with a target entity or target entity data that is useable to generate phishing attack domain names; using the target domain name input to generate the phishing attack domain names, wherein the phishing attack domain names include a plurality of domain names each having a phishing value comprising a likelihood or a probability of being used in a phishing campaign against the digital resources, where the likelihood or the probability satisfies a predetermined phishing value threshold; arranging the phishing attack domain names in a hierarchical order; and implementing one or more digital resources security protocols that mitigates the likelihood or the probability that selected domain names of the phishing attack domain names may be used in the phishing campaign against the digital resources.
    Type: Application
    Filed: July 12, 2017
    Publication date: January 25, 2018
    Inventors: Jordan Wright, Jon Oberheide