Patents by Inventor Ryan M. Noon
Ryan M. Noon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240089274Abstract: A system and method are disclosed for determining that a first electronic communication, received in a first private repository of a user, has been identified (e.g., flagged) as including a threat, and determining a probability that the first electronic communication includes the threat. In response to determining that the probability exceeds a threshold probability, the system monitors monitoring for a second electronic communication, received in a second private repository, that includes contents that match the contents of the first electronic communication.Type: ApplicationFiled: November 14, 2023Publication date: March 14, 2024Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Patent number: 11856007Abstract: A system and a method are disclosed for determining that a first electronic communication, received in a first private repository of a user, has been identified (e.g., flagged) as including a threat, and determining a probability that the first electronic communication includes the threat. In response to determining that the probability exceeds a threshold probability, the system monitors monitoring for a second electronic communication, received in a second private repository, that includes contents that match the contents of the first electronic communication.Type: GrantFiled: December 7, 2020Date of Patent: December 26, 2023Assignee: Material Security Inc.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20230412648Abstract: An example method comprises receiving, by a secure content system, an email from a sender to a recipient, scanning the contents of the email, evaluating the contents of the email based on a plurality of security rules, storing the sensitive data within a secure storage, generating a replacement email including a security link and not including at least the sensitive data, the security link providing a requester access to the sensitive data providing that a security function is satisfied, sending the replacement email including the security link to the recipient, receiving a request to access the sensitive data, the request being related to the security function challenging the requester using the security function, receiving, from the requester, a response to the security function, determining if the security function is satisfied by the response, and if the security function is satisfied, providing access to the sensitive data to the requester.Type: ApplicationFiled: September 6, 2023Publication date: December 21, 2023Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20230353581Abstract: A system and a method are disclosed for verifying a suspicious electronic communication. To this end, a secure communications service may detect an electronic communication comprising an identifier of a purported originator of the electronic communication and an identifier of an intended recipient, and determine that an attribute of the electronic communication corresponds to a suspicious attribute. Responsively, the service may intercept the electronic communication and storing the electronic communication in purgatory memory, so as to prevent the electronic communication from being populated in a private repository of the intended recipient, transmit a verification message, and receive a reply to the verification message that verifies the authenticity of the electronic communication.Type: ApplicationFiled: July 12, 2023Publication date: November 2, 2023Inventors: RYAN M. NOON, ABHISHEK AGRAWAL, CHRISTOPHER J. PARK
-
Patent number: 11799913Abstract: An example method comprises receiving, by a secure content system, an email from a sender to a recipient, scanning the contents of the email, evaluating the contents of the email based on a plurality of security rules, storing the sensitive data within a secure storage, generating a replacement email including a security link and not including at least the sensitive data, the security link providing a requester access to the sensitive data providing that a security function is satisfied, sending the replacement email including the security link to the recipient, receiving a request to access the sensitive data, the request being related to the security function challenging the requester using the security function, receiving, from the requester, a response to the security function, determining if the security function is satisfied by the response, and if the security function is satisfied, providing access to the sensitive data to the requester.Type: GrantFiled: July 16, 2021Date of Patent: October 24, 2023Assignee: Material Security Inc.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Patent number: 11785019Abstract: A system and a method are disclosed for verifying a suspicious electronic communication. To this end, a secure communications service may detect an electronic communication comprising an identifier of a purported originator of the electronic communication and an identifier of an intended recipient, and determine that an attribute of the electronic communication corresponds to a suspicious attribute. Responsively, the service may intercept the electronic communication and storing the electronic communication in purgatory memory, so as to prevent the electronic communication from being populated in a private repository of the intended recipient, transmit a verification message, and receive a reply to the verification message that verifies the authenticity of the electronic communication.Type: GrantFiled: October 14, 2021Date of Patent: October 10, 2023Assignee: Material Security Inc.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20230237195Abstract: A tool is disclosed for searching information redacted from electronic communications. The tool receives, based on input by a user into an interface of an electronic communication repository, a request to search through vaulted information, the vaulted information redacted from the electronic communication repository. The tool transmits an identity verification challenge to a device of the user and determines whether the identity verification challenge is successful. Responsive to determining that the identity verification challenge is successful, the tool searches the vaulted information for one or more files comprising a symbol input by the user, and generates, for display within the interface, identifiers corresponding to each of the one or more files.Type: ApplicationFiled: January 26, 2023Publication date: July 27, 2023Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20220070217Abstract: A system and a method are disclosed for verifying a suspicious electronic communication. To this end, a secure communications service may detect an electronic communication comprising an identifier of a purported originator of the electronic communication and an identifier of an intended recipient, and determine that an attribute of the electronic communication corresponds to a suspicious attribute. Responsively, the service may intercept the electronic communication and storing the electronic communication in purgatory memory, so as to prevent the electronic communication from being populated in a private repository of the intended recipient, transmit a verification message, and receive a reply to the verification message that verifies the authenticity of the electronic communication.Type: ApplicationFiled: October 14, 2021Publication date: March 3, 2022Inventors: RYAN M. NOON, ABHISHEK AGRAWAL, CHRISTOPHER J. PARK
-
Patent number: 11178178Abstract: A system and a method are disclosed for verifying a suspicious electronic communication. To this end, a secure communications service may detect an electronic communication comprising an identifier of a purported originator of the electronic communication and an identifier of an intended recipient, and determine that an attribute of the electronic communication corresponds to a suspicious attribute. Responsively, the service may intercept the electronic communication and storing the electronic communication in purgatory memory, so as to prevent the electronic communication from being populated in a private repository of the intended recipient, transmit a verification message, and receive a reply to the verification message that verifies the authenticity of the electronic communication.Type: GrantFiled: July 29, 2019Date of Patent: November 16, 2021Assignee: Material Security Inc.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20210344724Abstract: An example method comprises receiving, by a secure content system, an email from a sender to a recipient, scanning the contents of the email, evaluating the contents of the email based on a plurality of security rules, storing the sensitive data within a secure storage, generating a replacement email including a security link and not including at least the sensitive data, the security link providing a requester access to the sensitive data providing that a security function is satisfied, sending the replacement email including the security link to the recipient, receiving a request to access the sensitive data, the request being related to the security function challenging the requester using the security function, receiving, from the requester, a response to the security function, determining if the security function is satisfied by the response, and if the security function is satisfied, providing access to the sensitive data to the requester.Type: ApplicationFiled: July 16, 2021Publication date: November 4, 2021Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Patent number: 11102247Abstract: An example method comprises receiving, by a secure content system, an email from a sender to a recipient, scanning the contents of the email, evaluating the contents of the email based on a plurality of security rules, storing the sensitive data within a secure storage, generating a replacement email including a security link and not including at least the sensitive data, the security link providing a requester access to the sensitive data providing that a security function is satisfied, sending the replacement email including the security link to the recipient, receiving a request to access the sensitive data, the request being related to the security function challenging the requester using the security function, receiving, from the requester, a response to the security function, determining if the security function is satisfied by the response, and if the security function is satisfied, providing access to the sensitive data to the requester.Type: GrantFiled: July 12, 2018Date of Patent: August 24, 2021Assignee: MATERIAL SECURITY INC.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20210120020Abstract: A system and a method are disclosed for determining that a first electronic communication, received in a first private repository of a user, has been identified (e.g., flagged) as including a threat, and determining a probability that the first electronic communication includes the threat. In response to determining that the probability exceeds a threshold probability, the system monitors monitoring for a second electronic communication, received in a second private repository, that includes contents that match the contents of the first electronic communication.Type: ApplicationFiled: December 7, 2020Publication date: April 22, 2021Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20210037053Abstract: A system and a method are disclosed for verifying a suspicious electronic communication. To this end, a secure communications service may detect an electronic communication comprising an identifier of a purported originator of the electronic communication and an identifier of an intended recipient, and determine that an attribute of the electronic communication corresponds to a suspicious attribute. Responsively, the service may intercept the electronic communication and storing the electronic communication in purgatory memory, so as to prevent the electronic communication from being populated in a private repository of the intended recipient, transmit a verification message, and receive a reply to the verification message that verifies the authenticity of the electronic communication.Type: ApplicationFiled: July 29, 2019Publication date: February 4, 2021Inventors: RYAN M. NOON, ABHISHEK AGRAWAL, CHRISTOPHER J. PARK
-
Patent number: 10893060Abstract: A system and a method are disclosed for determining that a first electronic communication, received in a first private repository of a user, has been identified (e.g., flagged) as including a threat, and determining a probability that the first electronic communication includes the threat. In response to determining that the probability exceeds a threshold probability, the system monitors monitoring for a second electronic communication, received in a second private repository, that includes contents that match the contents of the first electronic communication.Type: GrantFiled: April 5, 2019Date of Patent: January 12, 2021Assignee: MATERIAL SECURITY INC.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20200322360Abstract: A system and a method are disclosed for determining that a first electronic communication, received in a first private repository of a user, has been identified (e.g., flagged) as including a threat, and determining a probability that the first electronic communication includes the threat. In response to determining that the probability exceeds a threshold probability, the system monitors monitoring for a second electronic communication, received in a second private repository, that includes contents that match the contents of the first electronic communication.Type: ApplicationFiled: April 5, 2019Publication date: October 8, 2020Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Publication number: 20190020687Abstract: An example method comprises receiving, by a secure content system, an email from a sender to a recipient, scanning the contents of the email, evaluating the contents of the email based on a plurality of security rules, storing the sensitive data within a secure storage, generating a replacement email including a security link and not including at least the sensitive data, the security link providing a requester access to the sensitive data providing that a security function is satisfied, sending the replacement email including the security link to the recipient, receiving a request to access the sensitive data, the request being related to the security function challenging the requester using the security function, receiving, from the requester, a response to the security function, determining if the security function is satisfied by the response, and if the security function is satisfied, providing access to the sensitive data to the requester.Type: ApplicationFiled: July 12, 2018Publication date: January 17, 2019Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park