Patents by Inventor Sebastien GOUTAL
Sebastien GOUTAL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200110806Abstract: A computer-implemented method of generating an augmented electronic text document comprises establishing a directed multigraph where each vertex is associated with a separate language and is connected to at least one other one of the vertices by an oriented edge indicative of a machine translation engine's ability to translate between languages associated with the vertices connected by the oriented edge with acceptable performance. The directed multigraph is then traversed starting at a predetermined origin vertex associated with an original language of the original electronic text document by randomly selecting an adjacent vertex pointed to by an oriented edge connected to the predetermined origin vertex and causing a machine translation engine to translate the original electronic text document from the original language to a language associated with the selected vertex.Type: ApplicationFiled: October 8, 2019Publication date: April 9, 2020Inventors: Sebastien GOUTAL, Maxime Marc Meyer
-
Publication number: 20200084228Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.Type: ApplicationFiled: March 14, 2019Publication date: March 12, 2020Inventor: Sebastien GOUTAL
-
Publication number: 20190392038Abstract: A computer-implemented method of generating an augmented electronic text document comprises establishing a directed multigraph where each vertex is associated with a separate language and is connected to at least one other one of the vertices by an oriented edge indicative of a machine translation engine's ability to translate between languages associated with the vertices connected by the oriented edge with acceptable performance. The directed multigraph is then traversed starting at a predetermined origin vertex associated with an original language of the original electronic text document by randomly selecting an adjacent vertex pointed to by an oriented edge connected to the predetermined origin vertex and causing a machine translation engine to translate the original electronic text document from the original language to a language associated with the selected vertex.Type: ApplicationFiled: June 20, 2018Publication date: December 26, 2019Inventors: Sebastien GOUTAL, Maxime Marc MEYER
-
Publication number: 20190327268Abstract: A computer-implemented method of preventing leakage of user credentials to phishing websites may comprise capturing user credentials input to website; updating a stored list of trusted website credentials upon determining that the domain of the URL of the website is present in a stored list of trusted websites; generating a hash of the captured user credentials; determining whether the hashed user credentials matches one of the hashed user credentials in the list of trusted website credentials; and when a match is found, requesting input whether the website is trusted or whether the website is unknown and/or untrusted; sending the URL to a remote computer server when the input indicates that the website is unknown and/or untrusted and disallowing submission of the user credentials to the website; adding the domain of the URL to the stored list of trusted websites, adding the generated hash of the captured user credentials to a stored list of trusted website credentials and allowing submission of the user credType: ApplicationFiled: April 1, 2019Publication date: October 24, 2019Inventors: Sebastien GOUTAL, Antoine HONORE
-
Patent number: 10389668Abstract: A computer-implemented method of unsubscribing a recipient of an electronic message may comprise identifying and extracting an unsubscribe Universal Resource Indicator (URI) from the electronic message and carrying out a dynamic unsubscribe scenario if the extracted unsubscribe URI matches a known unsubscribe URI. The dynamic unsubscribe scenario may comprise instructions that are selectively executed depending on contents of a single unsubscribe form in a webpage pointed to by the extracted unsubscribe URI. These instructions may comprise finding and filling in a single input field in the webpage that is relevant to unsubscribing with an electronic address of the recipient or finding and updating a user interface element that is relevant to unsubscribing. The single unsubscribe form with the filled in single relevant input field or updated user interface element may then be submitted and a determination may be made whether an unsubscribe confirmation message was generated.Type: GrantFiled: November 9, 2018Date of Patent: August 20, 2019Assignee: VADE SECURE INC.Inventor: Sebastien Goutal
-
Patent number: 10356125Abstract: A computer-implemented method of preventing leakage of user credentials to phishing websites may comprise capturing user credentials input to website; updating a stored list of trusted website credentials upon determining that the domain of the URL of the website is present in a stored list of trusted websites; generating a hash of the captured user credentials; determining whether the hashed user credentials matches one of the hashed user credentials in the list of trusted website credentials; and when a match is found, requesting input whether the website is trusted or whether the website is unknown and/or untrusted; sending the URL to a remote computer server when the input indicates that the website is unknown and/or untrusted and disallowing submission of the user credentials to the website; adding the domain of the URL to the stored list of trusted websites, adding the generated hash of the captured user credentials to a stored list of trusted website credentials and allowing submission of the user credType: GrantFiled: May 26, 2017Date of Patent: July 16, 2019Assignee: VADE SECURE, INC.Inventors: Sebastien Goutal, Antoine Honore
-
Publication number: 20190141076Abstract: A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a computer network, the electronic message containing a uniform resource locator (URL). The URL in the received electronic message may be parsed and one or more original parameter may be identified therein. The type of the identified original parameter(s) may be determined. The identified original parameter(s) may then be transformed according to a parameter transformation rules, selected according to the determined type. to generate transformed parameter(s). The URL may then be reassembled by substituting the transformed parameter(s) for the original parameter(s). The website pointed to by the reassembled URL may then be accessed, over the computer network, using the transformed parameter(s) only if the reassembled URL meets a predetermined minimum criterion.Type: ApplicationFiled: August 24, 2018Publication date: May 9, 2019Inventor: Sebastien GOUTAL
-
Patent number: 10284579Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.Type: GrantFiled: March 22, 2017Date of Patent: May 7, 2019Assignee: VADE SECURE, INC.Inventor: Sebastien Goutal
-
Publication number: 20190081917Abstract: A computer-implemented method of unsubscribing a recipient of an electronic message may comprise identifying and extracting an unsubscribe Universal Resource Indicator (URI) from the electronic message and carrying out a dynamic unsubscribe scenario if the extracted unsubscribe URI matches a known unsubscribe URI. The dynamic unsubscribe scenario may comprise instructions that are selectively executed depending on contents of a single unsubscribe form in a webpage pointed to by the extracted unsubscribe URI. These instructions may comprise finding and filling in a single input field in the webpage that is relevant to unsubscribing with an electronic address of the recipient or finding and updating a user interface element that is relevant to unsubscribing. The single unsubscribe form with the filled in single relevant input field or updated user interface element may then be submitted and a determination may be made whether an unsubscribe confirmation message was generated.Type: ApplicationFiled: November 9, 2018Publication date: March 14, 2019Inventor: Sebastien GOUTAL
-
Patent number: 10164927Abstract: A computer-implemented method of unsubscribing a recipient of an electronic message may comprise identifying and extracting an unsubscribe Universal Resource Indicator (URI) from the electronic message and carrying out a dynamic unsubscribe scenario if the extracted unsubscribe URI does not match a known unsubscribe URI pattern. The dynamic unsubscribe scenario may comprise instructions that are selectively executed depending on contents of a single unsubscribe form in a webpage pointed to by the extracted unsubscribe URI. These instructions may comprise finding and filling in a single input field in the webpage that is relevant to unsubscribing with an electronic address of the recipient or finding and updating a user interface element that is relevant to unsubscribing. The single unsubscribe form with the filled in single relevant input field or updated user interface element may then be submitted and a determination may be made whether an unsubscribe confirmation message was generated.Type: GrantFiled: January 14, 2015Date of Patent: December 25, 2018Assignee: VADE SECURE, INC.Inventor: Sebastien Goutal
-
Publication number: 20180343283Abstract: A computer-implemented method of preventing leakage of user credentials to phishing websites may comprise capturing user credentials input to website; updating a stored list of trusted website credentials upon determining that the domain of the URL of the website is present in a stored list of trusted websites; generating a hash of the captured user credentials; determining whether the hashed user credentials matches one of the hashed user credentials in the list of trusted website credentials; and when a match is found, requesting input whether the website is trusted or whether the website is unknown and/or untrusted; sending the URL to a remote computer server when the input indicates that the website is unknown and/or untrusted and disallowing submission of the user credentials to the website; adding the domain of the URL to the stored list of trusted websites, adding the generated hash of the captured user credentials to a stored list of trusted website credentials and allowing submission of the user credType: ApplicationFiled: May 26, 2017Publication date: November 29, 2018Inventors: Sebastien GOUTAL, Antoine HONORE
-
Patent number: 10142366Abstract: A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a computer network, the electronic message containing a uniform resource locator (URL). The URL in the received electronic message may be parsed and one or more original parameter may be identified therein. The type of the identified original parameter(s) may be determined. The identified original parameter(s) may then be transformed according to a parameter transformation rules, selected according to the determined type. to generate transformed parameter(s). The URL may then be reassembled by substituting the transformed parameter(s) for the original parameter(s). The website pointed to by the reassembled URL may then be accessed, over the computer network, using the transformed parameter(s) only if the reassembled URL meets a predetermined minimum criterion.Type: GrantFiled: March 15, 2016Date of Patent: November 27, 2018Assignee: VADE SECURE, INC.Inventor: Sebastien Goutal
-
Publication number: 20180278627Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Inventor: Sebastien GOUTAL
-
Patent number: 10021134Abstract: A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link comprises a phishing attempt. This determination may comprise comparing features of the link with records stored in a remote database to determine whether the link comprises a phishing attempt. It may be determined that the link comprises a phishing attempt if there is a match. If the compared features do not match the records stored in the remote database, a multi-dimensional input vector may be built from features of the link, which input vector may then be input into a phishing probability engine. The probability that the link comprises a phishing attempt may be computed by the phishing probability engine. Thereafter, the received email may be acted upon according to the computed probability that the link comprises a phishing attempt.Type: GrantFiled: May 26, 2016Date of Patent: July 10, 2018Assignee: VADE SECURE TECHNOLOGY, INC.Inventor: Sebastien Goutal
-
Publication number: 20180007066Abstract: A computer-implemented method may comprise receiving, over a computer network, an email comprising a link to a fraudulent website of a counterfeited brand, the fraudulent website comprising at least one login page that comprises at least one field configured to accept user credentials; determining constraints on the user credentials that must be satisfied for the user credentials to be accepted by the fraudulent website when input into the at least one field; randomly generating at least some marker elements that satisfy the determined constraints; using the randomly-generated marker elements, generating fake user credentials that satisfy the determined constraints; assembling the generated fake user credentials into a marker that is specific to the counterfeited brand and to the fraudulent website; programmatically inputting the generated fake user credentials into the at least one field of the at least one login page of the fraudulent website; and publishing the marker injected into the fraudulent website tType: ApplicationFiled: June 30, 2016Publication date: January 4, 2018Inventor: Sebastien GOUTAL
-
Publication number: 20170272464Abstract: A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a computer network, the electronic message containing a uniform resource locator (URL). The URL in the received electronic message may be parsed and one or more original parameter may be identified therein. The type of the identified original parameter(s) may be determined. The identified original parameter(s) may then be transformed according to a parameter transformation rules, selected according to the determined type. to generate transformed parameter(s). The URL may then be reassembled by substituting the transformed parameter(s) for the original parameter(s). The website pointed to by the reassembled URL may then be accessed, over the computer network, using the transformed parameter(s) only if the reassembled URL meets a predetermined minimum criterion.Type: ApplicationFiled: March 15, 2016Publication date: September 21, 2017Inventor: Sebastien GOUTAL
-
Publication number: 20170257395Abstract: A list of known addresses of electronic messages may be maintained, as may be a list of known display names of electronic messages. A list of blacklisted email addresses, which are always assumed to be fraudulent or malicious, may also be maintained. For each electronic message received by a user, it may be determined whether the address or display name looks suspicious; that is, whether the received email appears to impersonate a known email address or a known display name. The user may be warned if a received electronic message is determined to be or may likely be or contain an illegitimate or spoofed address or display name.Type: ApplicationFiled: March 7, 2016Publication date: September 7, 2017Inventor: Sébastien GOUTAL
-
Publication number: 20170085584Abstract: A computer-implemented method may comprise receiving an electronic message from a purported known sender; accessing a database of known senders and determining whether the sender matches one of the known senders. The degree of similarity of the sender to at least one of the known senders may then be quantified. The received message may then be determined to be legitimate when the purported known sender is determined to match one of the known senders. The received electronic message may be flagged as being suspect when the purported known sender does not match one of the plurality of known senders and the quantified degree of similarity of the purported known sender to one of the known senders is greater than a threshold value. A perceptible cue may then be generated when the received message has been flagged as being suspect, to alert the recipient that the flagged message is likely illegitimate.Type: ApplicationFiled: September 22, 2015Publication date: March 23, 2017Inventor: Sebastien GOUTAL
-
Publication number: 20160352777Abstract: A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link comprises a phishing attempt. This determination may comprise comparing features of the link with records stored in a remote database to determine whether the link comprises a phishing attempt. It may be determined that the link comprises a phishing attempt if there is a match. If the compared features do not match the records stored in the remote database, a multi-dimensional input vector may be built from features of the link, which input vector may then be input into a phishing probability engine. The probability that the link comprises a phishing attempt may be computed by the phishing probability engine. Thereafter, the received email may be acted upon according to the computed probability that the link comprises a phishing attempt.Type: ApplicationFiled: May 26, 2016Publication date: December 1, 2016Inventor: Sebastien GOUTAL
-
Patent number: 9398047Abstract: A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link comprises a phishing attempt. This determination may comprise comparing features of the link with records stored in a remote database to determine whether the link comprises a phishing attempt. It may be determined that the link comprises a phishing attempt if there is a match. If the compared features do not match the records stored in the remote database, a multi-dimensional input vector may be built from features of the link, which input vector may then be input into a phishing probability engine. The probability that the link comprises a phishing attempt may be computed by the phishing probability engine. Thereafter, the received email may be acted upon according to the computed probability that the link comprises a phishing attempt.Type: GrantFiled: November 17, 2014Date of Patent: July 19, 2016Assignee: VADE RETRO TECHNOLOGY, INC.Inventor: Sebastien Goutal