Patents by Inventor Norman Sadeh

Norman Sadeh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9398029
    Abstract: A cybersecurity training system uses lures and training actions to help train a user of an electronic device to recognize and act appropriately in situations that could compromise security. The system includes an administrator interface by which an administrator may customize a lure and/or a training action with branded content. When used in a lure, this enables the lure to appear to the user as if it were a legitimate, non-threatening action from the brand. If the user falls for the lure, the system may provide the user with cybersecurity training, which may automatically include content that is tailored for the selected brand.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: July 19, 2016
    Assignee: Wombat Security Technologies, Inc.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Joseph A. Ferrara
  • Patent number: 9373267
    Abstract: A context-aware training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user or a group of users. The system includes an administrator interface that enables an administrator to select, customize and/or assign constraints to the training action that will be delivered to the user(s).
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: June 21, 2016
    Assignee: Wombat Security Technologies, Inc.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Patent number: 9280911
    Abstract: A context-aware training system senses sensing a user action that may expose the user's computer to a cybersecurity threat. The system selects training action from a collection of available training actions and causes the training action to be selected to the user.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 8, 2016
    Assignee: Wombat Security Technologies, Inc.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20160036829
    Abstract: A cybersecurity training system uses lures and training actions to help train a user of an electronic device to recognize and act appropriately in situations that could compromise security. The system includes an administrator interface by which an administrator may customize a lure and/or a training action with branded content. When used in a lure, this enables the lure to appear to the user as if it were a legitimate, non-threatening action from the brand. If the user falls for the lure, the system may provide the user with cybersecurity training, which may automatically include content that is tailored for the selected brand.
    Type: Application
    Filed: February 11, 2015
    Publication date: February 4, 2016
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Joseph A. Ferrara
  • Publication number: 20140199664
    Abstract: A training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The user action may be in response to a mock attack delivered via a messaging service, a wireless communication service, a fake malware application or another device, service, system or mechanism. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user.
    Type: Application
    Filed: March 17, 2014
    Publication date: July 17, 2014
    Applicant: Wombat Security Technologies, Inc.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20140199663
    Abstract: A context-aware training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user or a group of users. The system includes an administrator interface that enables an administrator to select, customize and/or assign constraints to the training action that will be delivered to the user(s).
    Type: Application
    Filed: March 17, 2014
    Publication date: July 17, 2014
    Applicant: Wombat Security Technologies, Inc.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Patent number: 8423483
    Abstract: Various embodiments are directed to a computer implemented method for updating a policy that is enforced by a computer program. In one embodiment, a computer communicates, to a user, data regarding one or more decisions made by the program over a period of time according to a policy. Each decision is made on the particular policy in force at the time the decision is made. Policy data for the policy is stored in a machine readable format. The user feedback data indicative of feedback by the user regarding the one or more decisions is stored. The computer identifies and ranks one or more potential variations to the policy based on a score of an objective function for each potential variation. The computer communicates, to the user, one or more suggested modifications based on the ranking of the one or more potential variations to the policy. The computer modifies the policy data based on one or more selections by the user in response to the transmission of the one or more suggested modifications.
    Type: Grant
    Filed: May 16, 2009
    Date of Patent: April 16, 2013
    Assignees: Carnegie Mellon University, Wombat Security Technology, Inc.
    Inventors: Norman Sadeh-Koniecpol, Paul Hankes Drielsma, Lorrie Faith Candor, Patrick Kelley
  • Publication number: 20120258437
    Abstract: Context-aware training systems, apparatuses and systems. The context-aware training systems, apparatuses and systems are computer-implemented and include sensing a user action and, based on a training needs model, estimating a cost or benefit to exposing the user to a training action, selecting a training action from a collection of available training actions and delivering the training action to the user if the user action indicates a need for the user to be trained and the cost or benefit to exposing the user to the training action indicates user exposure to the training action is warranted.
    Type: Application
    Filed: April 9, 2012
    Publication date: October 11, 2012
    Applicant: WOMBAT SECURITY TECHNOLOGIES, INC.
    Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
  • Publication number: 20100036779
    Abstract: Various embodiments are directed to a computer implemented method for updating a policy that is enforced by a computer program. In one embodiment, a computer communicates, to a user, data regarding one or more decisions made by the program over a period of time according to a policy. Each decision is made on the particular policy in force at the time the decision is made. Policy data for the policy is stored in a machine readable format. The user feedback data indicative of feedback by the user regarding the one or more decisions is stored. The computer identifies and ranks one or more potential variations to the policy based on a score of an objective function for each potential variation. The computer communicates, to the user, one or more suggested modifications based on the ranking of the one or more potential variations to the policy. The computer modifies the policy data based on one or more selections by the user in response to the transmission of the one or more suggested modifications.
    Type: Application
    Filed: May 16, 2009
    Publication date: February 11, 2010
    Inventors: Norman Sadeh-Koniecpol, Patrick Gage Kelley, Lorrie Faith Cranor, Paul Hankes Drielsma