Patents by Inventor Rob JUNCKER

Rob JUNCKER has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12244611
    Abstract: Systems and techniques for security content delivery based on tagged personas are described herein. User data may be obtained for a user of a network file system. Attributes may be extracted from the user data to establish a user persona. Event data may be obtained for a security event experienced by the network file system. The security event may be associated with the user. A set of available remediation content items may be identified using the event data. A content item may be selected from the set of remediation content items using the user persona. A transmission medium may be determined for transmission of the content item to the user using the user persona. The content item may be transmitted to the user via the transmission medium.
    Type: Grant
    Filed: June 23, 2022
    Date of Patent: March 4, 2025
    Assignee: Code42 Software, Inc.
    Inventors: Rob Juncker, Vijay Ramanathan, Chrysa Freeman, Alex Matheson, Kyle Venberg
  • Publication number: 20230421574
    Abstract: Systems and techniques for security content delivery based on tagged personas are described herein. User data may be obtained for a user of a network file system. Attributes may be extracted from the user data to establish a user persona. Event data may be obtained for a security event experienced by the network file system. The security event may be associated with the user. A set of available remediation content items may be identified using the event data. A content item may be selected from the set of remediation content items using the user persona. A transmission medium may be determined for transmission of the content item to the user using the user persona. The content item may be transmitted to the user via the transmission medium.
    Type: Application
    Filed: June 23, 2022
    Publication date: December 28, 2023
    Inventors: Rob Juncker, Vijay Ramanathan, Chrysa Freeman, Alex Matheson, Kyle Venberg
  • Patent number: 11720702
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for applications that detect indicators of data exfiltration through applications such as browser-based interfaces. The disclosed system monitors file system element events related to one or more target applications (such as browsers) through operating system interfaces. Once an event of interest is detected, the system interfaces with the browser to determine a context for the event of interest that may include a URL of a website that the user was visiting corresponding to the file system element event. If the URL is directed towards a prohibited site, a notification may be generated that may be used as a signal to alert an administrator. As used herein, a file system element may include a file, directory, folder, archive, blob, raw storage, metadata, or the like File system element events may include copying, deleting, modifying, or moving a file system element.
    Type: Grant
    Filed: April 28, 2021
    Date of Patent: August 8, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Rob Juncker, Neil Kulevsky, Andrew Moravec, James Sablatura, Shane Zako
  • Patent number: 11700264
    Abstract: An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The processor identifies a user role for the current user based on the software application and/or usage data. The processor applies a security configuration to the client computing device based on the user role. The security configuration limits access by the current user to a portion of the software application. The processor sends an identifier of the user role to an administrative server for storage in an Active Directory (AD) database.
    Type: Grant
    Filed: November 9, 2020
    Date of Patent: July 11, 2023
    Assignee: Ivanti, Inc.
    Inventors: Randy Deninno, Mark Robert Tempel, Travis Peters, Rob Juncker
  • Patent number: 11671435
    Abstract: A system for detecting anomalous user interactions with a computing resource a processor and a memory communicatively coupled to the processor and configured with instructions, which cause the processor to perform operations including receiving a request to monitor interactions of a user with the computing resource, obtaining first event data first event data that includes information that is indicative of first interactions of the user with the computing resource prior to receiving the request and obtaining second event data that includes information that is indicative of second interactions of the user with the computing resource after receiving the request. The operations further include determining, based on the first event data and the second event data, whether a deviation between the first interactions and the second interactions satisfies an indicated criteria. The operations additionally include generating a security alert based on the determination.
    Type: Grant
    Filed: January 2, 2020
    Date of Patent: June 6, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Daniel Louis Sullivan, Rob Juncker, Danaca Booth
  • Publication number: 20220350905
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for applications that detect indicators of data exfiltration through applications such as browser-based interfaces. The disclosed system monitors file system element events related to one or more target applications (such as browsers) through operating system interfaces. Once an event of interest is detected, the system interfaces with the browser to determine a context for the event of interest that may include a URL of a website that the user was visiting corresponding to the file system element event. If the URL is directed towards a prohibited site, a notification may be generated that may be used as a signal to alert an administrator. As used herein, a file system element may include a file, directory, folder, archive, blob, raw storage, metadata, or the like File system element events may include copying, deleting, modifying, or moving a file system element.
    Type: Application
    Filed: April 28, 2021
    Publication date: November 3, 2022
    Inventors: Rob Juncker, Neil Kulevsky, Andrew Moravec, James Sablatura, Shane Zako
  • Publication number: 20220171678
    Abstract: A system for processing a file stored on a computing system includes causing a processor of the system to obtain file usage data that is indicative of a number of times the file is loaded into a memory of the system and to obtain file-size data that is indicative of a size the file. The system further includes causing the processor to obtain metadata indicative of contents the file and to determine a file value based on the file usage data and at least one of the file-size data, the metadata, or a file-identifier value that is derived from an identifier of the file, where the file value comprising a quantitative or qualitative indicator of a value of the file. The system additionally includes causing the processor to adjust processing of the file relative to processing of other files associated with the computing system based on the file value.
    Type: Application
    Filed: December 2, 2020
    Publication date: June 2, 2022
    Inventors: Rob Juncker, Thomas Anthony Lindquist, Mike Woodfill, Adam Nave
  • Publication number: 20210211443
    Abstract: A system for detecting anomalous user interactions with a computing resource a processor and a memory communicatively coupled to the processor and configured with instructions, which cause the processor to perform operations including receiving a request to monitor interactions of a user with the computing resource, obtaining first event data first event data that includes information that is indicative of first interactions of the user with the computing resource prior to receiving the request and obtaining second event data that includes information that is indicative of second interactions of the user with the computing resource after receiving the request. The operations further include determining, based on the first event data and the second event data, whether a deviation between the first interactions and the second interactions satisfies an indicated criteria. The operations additionally include generating a security alert based on the determination.
    Type: Application
    Filed: January 2, 2020
    Publication date: July 8, 2021
    Inventors: Daniel Louis Sullivan, Rob Juncker, Danaca Booth
  • Publication number: 20210160249
    Abstract: An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The processor identifies a user role for the current user based on the software application and/or usage data. The processor applies a security configuration to the client computing device based on the user role. The security configuration limits access by the current user to a portion of the software application. The processor sends an identifier of the user role to an administrative server for storage in an Active Directory (AD) database.
    Type: Application
    Filed: November 9, 2020
    Publication date: May 27, 2021
    Applicant: Ivanti, Inc.
    Inventors: Randy Deninno, Mark Robert Tempel, Travis Peters, Rob Juncker
  • Patent number: 9092201
    Abstract: General-purpose components are selectively included in a toolkit hosted by hosting provider computing devices. The general-purpose components are software components. The general-purpose components in the toolkit are available over a computer network to end user computing devices. The end user computing devices utilizes general-purpose components in the toolkit to provide system administration solutions. The system administration solutions are web applications hosted by the hosting provider computing devices. The system administration solutions provide an ability to perform administration tasks on on-premises computer systems of the end users. A hosting provider computing device is configured such that the end user computing devices are able to utilize the general-purpose components in the toolkit on a Software-as-a-Service (SaaS) basis.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: July 28, 2015
    Assignee: Crimson Corporation
    Inventors: Mark Shavlik, John G. Morgan, Rob Juncker
  • Publication number: 20140013300
    Abstract: General-purpose components are selectively included in a toolkit hosted by hosting provider computing devices. The general-purpose components are software components. The general-purpose components in the toolkit are available over a computer network to end user computing devices. The end user computing devices utilizes general-purpose components in the toolkit to provide system administration solutions. The system administration solutions are web applications hosted by the hosting provider computing devices. The system administration solutions provide an ability to perform administration tasks on on-premises computer systems of the end users. A hosting provider computing device is configured such that the end user computing devices are able to utilize the general-purpose components in the toolkit on a Software-as-a-Service (SaaS) basis.
    Type: Application
    Filed: April 1, 2013
    Publication date: January 9, 2014
    Applicant: Crimson Corporation
    Inventors: Mark SHAVLIK, John G. MORGAN, Rob JUNCKER