Patents by Inventor Sebastien GOUTAL

Sebastien GOUTAL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200110806
    Abstract: A computer-implemented method of generating an augmented electronic text document comprises establishing a directed multigraph where each vertex is associated with a separate language and is connected to at least one other one of the vertices by an oriented edge indicative of a machine translation engine's ability to translate between languages associated with the vertices connected by the oriented edge with acceptable performance. The directed multigraph is then traversed starting at a predetermined origin vertex associated with an original language of the original electronic text document by randomly selecting an adjacent vertex pointed to by an oriented edge connected to the predetermined origin vertex and causing a machine translation engine to translate the original electronic text document from the original language to a language associated with the selected vertex.
    Type: Application
    Filed: October 8, 2019
    Publication date: April 9, 2020
    Inventors: Sebastien GOUTAL, Maxime Marc Meyer
  • Publication number: 20200084228
    Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.
    Type: Application
    Filed: March 14, 2019
    Publication date: March 12, 2020
    Inventor: Sebastien GOUTAL
  • Publication number: 20190392038
    Abstract: A computer-implemented method of generating an augmented electronic text document comprises establishing a directed multigraph where each vertex is associated with a separate language and is connected to at least one other one of the vertices by an oriented edge indicative of a machine translation engine's ability to translate between languages associated with the vertices connected by the oriented edge with acceptable performance. The directed multigraph is then traversed starting at a predetermined origin vertex associated with an original language of the original electronic text document by randomly selecting an adjacent vertex pointed to by an oriented edge connected to the predetermined origin vertex and causing a machine translation engine to translate the original electronic text document from the original language to a language associated with the selected vertex.
    Type: Application
    Filed: June 20, 2018
    Publication date: December 26, 2019
    Inventors: Sebastien GOUTAL, Maxime Marc MEYER
  • Publication number: 20190327268
    Abstract: A computer-implemented method of preventing leakage of user credentials to phishing websites may comprise capturing user credentials input to website; updating a stored list of trusted website credentials upon determining that the domain of the URL of the website is present in a stored list of trusted websites; generating a hash of the captured user credentials; determining whether the hashed user credentials matches one of the hashed user credentials in the list of trusted website credentials; and when a match is found, requesting input whether the website is trusted or whether the website is unknown and/or untrusted; sending the URL to a remote computer server when the input indicates that the website is unknown and/or untrusted and disallowing submission of the user credentials to the website; adding the domain of the URL to the stored list of trusted websites, adding the generated hash of the captured user credentials to a stored list of trusted website credentials and allowing submission of the user cred
    Type: Application
    Filed: April 1, 2019
    Publication date: October 24, 2019
    Inventors: Sebastien GOUTAL, Antoine HONORE
  • Patent number: 10389668
    Abstract: A computer-implemented method of unsubscribing a recipient of an electronic message may comprise identifying and extracting an unsubscribe Universal Resource Indicator (URI) from the electronic message and carrying out a dynamic unsubscribe scenario if the extracted unsubscribe URI matches a known unsubscribe URI. The dynamic unsubscribe scenario may comprise instructions that are selectively executed depending on contents of a single unsubscribe form in a webpage pointed to by the extracted unsubscribe URI. These instructions may comprise finding and filling in a single input field in the webpage that is relevant to unsubscribing with an electronic address of the recipient or finding and updating a user interface element that is relevant to unsubscribing. The single unsubscribe form with the filled in single relevant input field or updated user interface element may then be submitted and a determination may be made whether an unsubscribe confirmation message was generated.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: August 20, 2019
    Assignee: VADE SECURE INC.
    Inventor: Sebastien Goutal
  • Patent number: 10356125
    Abstract: A computer-implemented method of preventing leakage of user credentials to phishing websites may comprise capturing user credentials input to website; updating a stored list of trusted website credentials upon determining that the domain of the URL of the website is present in a stored list of trusted websites; generating a hash of the captured user credentials; determining whether the hashed user credentials matches one of the hashed user credentials in the list of trusted website credentials; and when a match is found, requesting input whether the website is trusted or whether the website is unknown and/or untrusted; sending the URL to a remote computer server when the input indicates that the website is unknown and/or untrusted and disallowing submission of the user credentials to the website; adding the domain of the URL to the stored list of trusted websites, adding the generated hash of the captured user credentials to a stored list of trusted website credentials and allowing submission of the user cred
    Type: Grant
    Filed: May 26, 2017
    Date of Patent: July 16, 2019
    Assignee: VADE SECURE, INC.
    Inventors: Sebastien Goutal, Antoine Honore
  • Publication number: 20190141076
    Abstract: A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a computer network, the electronic message containing a uniform resource locator (URL). The URL in the received electronic message may be parsed and one or more original parameter may be identified therein. The type of the identified original parameter(s) may be determined. The identified original parameter(s) may then be transformed according to a parameter transformation rules, selected according to the determined type. to generate transformed parameter(s). The URL may then be reassembled by substituting the transformed parameter(s) for the original parameter(s). The website pointed to by the reassembled URL may then be accessed, over the computer network, using the transformed parameter(s) only if the reassembled URL meets a predetermined minimum criterion.
    Type: Application
    Filed: August 24, 2018
    Publication date: May 9, 2019
    Inventor: Sebastien GOUTAL
  • Patent number: 10284579
    Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: May 7, 2019
    Assignee: VADE SECURE, INC.
    Inventor: Sebastien Goutal
  • Publication number: 20190081917
    Abstract: A computer-implemented method of unsubscribing a recipient of an electronic message may comprise identifying and extracting an unsubscribe Universal Resource Indicator (URI) from the electronic message and carrying out a dynamic unsubscribe scenario if the extracted unsubscribe URI matches a known unsubscribe URI. The dynamic unsubscribe scenario may comprise instructions that are selectively executed depending on contents of a single unsubscribe form in a webpage pointed to by the extracted unsubscribe URI. These instructions may comprise finding and filling in a single input field in the webpage that is relevant to unsubscribing with an electronic address of the recipient or finding and updating a user interface element that is relevant to unsubscribing. The single unsubscribe form with the filled in single relevant input field or updated user interface element may then be submitted and a determination may be made whether an unsubscribe confirmation message was generated.
    Type: Application
    Filed: November 9, 2018
    Publication date: March 14, 2019
    Inventor: Sebastien GOUTAL
  • Patent number: 10164927
    Abstract: A computer-implemented method of unsubscribing a recipient of an electronic message may comprise identifying and extracting an unsubscribe Universal Resource Indicator (URI) from the electronic message and carrying out a dynamic unsubscribe scenario if the extracted unsubscribe URI does not match a known unsubscribe URI pattern. The dynamic unsubscribe scenario may comprise instructions that are selectively executed depending on contents of a single unsubscribe form in a webpage pointed to by the extracted unsubscribe URI. These instructions may comprise finding and filling in a single input field in the webpage that is relevant to unsubscribing with an electronic address of the recipient or finding and updating a user interface element that is relevant to unsubscribing. The single unsubscribe form with the filled in single relevant input field or updated user interface element may then be submitted and a determination may be made whether an unsubscribe confirmation message was generated.
    Type: Grant
    Filed: January 14, 2015
    Date of Patent: December 25, 2018
    Assignee: VADE SECURE, INC.
    Inventor: Sebastien Goutal
  • Publication number: 20180343283
    Abstract: A computer-implemented method of preventing leakage of user credentials to phishing websites may comprise capturing user credentials input to website; updating a stored list of trusted website credentials upon determining that the domain of the URL of the website is present in a stored list of trusted websites; generating a hash of the captured user credentials; determining whether the hashed user credentials matches one of the hashed user credentials in the list of trusted website credentials; and when a match is found, requesting input whether the website is trusted or whether the website is unknown and/or untrusted; sending the URL to a remote computer server when the input indicates that the website is unknown and/or untrusted and disallowing submission of the user credentials to the website; adding the domain of the URL to the stored list of trusted websites, adding the generated hash of the captured user credentials to a stored list of trusted website credentials and allowing submission of the user cred
    Type: Application
    Filed: May 26, 2017
    Publication date: November 29, 2018
    Inventors: Sebastien GOUTAL, Antoine HONORE
  • Patent number: 10142366
    Abstract: A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a computer network, the electronic message containing a uniform resource locator (URL). The URL in the received electronic message may be parsed and one or more original parameter may be identified therein. The type of the identified original parameter(s) may be determined. The identified original parameter(s) may then be transformed according to a parameter transformation rules, selected according to the determined type. to generate transformed parameter(s). The URL may then be reassembled by substituting the transformed parameter(s) for the original parameter(s). The website pointed to by the reassembled URL may then be accessed, over the computer network, using the transformed parameter(s) only if the reassembled URL meets a predetermined minimum criterion.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: November 27, 2018
    Assignee: VADE SECURE, INC.
    Inventor: Sebastien Goutal
  • Publication number: 20180278627
    Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Inventor: Sebastien GOUTAL
  • Patent number: 10021134
    Abstract: A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link comprises a phishing attempt. This determination may comprise comparing features of the link with records stored in a remote database to determine whether the link comprises a phishing attempt. It may be determined that the link comprises a phishing attempt if there is a match. If the compared features do not match the records stored in the remote database, a multi-dimensional input vector may be built from features of the link, which input vector may then be input into a phishing probability engine. The probability that the link comprises a phishing attempt may be computed by the phishing probability engine. Thereafter, the received email may be acted upon according to the computed probability that the link comprises a phishing attempt.
    Type: Grant
    Filed: May 26, 2016
    Date of Patent: July 10, 2018
    Assignee: VADE SECURE TECHNOLOGY, INC.
    Inventor: Sebastien Goutal
  • Publication number: 20180007066
    Abstract: A computer-implemented method may comprise receiving, over a computer network, an email comprising a link to a fraudulent website of a counterfeited brand, the fraudulent website comprising at least one login page that comprises at least one field configured to accept user credentials; determining constraints on the user credentials that must be satisfied for the user credentials to be accepted by the fraudulent website when input into the at least one field; randomly generating at least some marker elements that satisfy the determined constraints; using the randomly-generated marker elements, generating fake user credentials that satisfy the determined constraints; assembling the generated fake user credentials into a marker that is specific to the counterfeited brand and to the fraudulent website; programmatically inputting the generated fake user credentials into the at least one field of the at least one login page of the fraudulent website; and publishing the marker injected into the fraudulent website t
    Type: Application
    Filed: June 30, 2016
    Publication date: January 4, 2018
    Inventor: Sebastien GOUTAL
  • Publication number: 20170272464
    Abstract: A computer-implemented method may comprise receiving an electronic message (such as a legitimate email or malicious phishing email, for example) over a computer network, the electronic message containing a uniform resource locator (URL). The URL in the received electronic message may be parsed and one or more original parameter may be identified therein. The type of the identified original parameter(s) may be determined. The identified original parameter(s) may then be transformed according to a parameter transformation rules, selected according to the determined type. to generate transformed parameter(s). The URL may then be reassembled by substituting the transformed parameter(s) for the original parameter(s). The website pointed to by the reassembled URL may then be accessed, over the computer network, using the transformed parameter(s) only if the reassembled URL meets a predetermined minimum criterion.
    Type: Application
    Filed: March 15, 2016
    Publication date: September 21, 2017
    Inventor: Sebastien GOUTAL
  • Publication number: 20170257395
    Abstract: A list of known addresses of electronic messages may be maintained, as may be a list of known display names of electronic messages. A list of blacklisted email addresses, which are always assumed to be fraudulent or malicious, may also be maintained. For each electronic message received by a user, it may be determined whether the address or display name looks suspicious; that is, whether the received email appears to impersonate a known email address or a known display name. The user may be warned if a received electronic message is determined to be or may likely be or contain an illegitimate or spoofed address or display name.
    Type: Application
    Filed: March 7, 2016
    Publication date: September 7, 2017
    Inventor: Sébastien GOUTAL
  • Publication number: 20170085584
    Abstract: A computer-implemented method may comprise receiving an electronic message from a purported known sender; accessing a database of known senders and determining whether the sender matches one of the known senders. The degree of similarity of the sender to at least one of the known senders may then be quantified. The received message may then be determined to be legitimate when the purported known sender is determined to match one of the known senders. The received electronic message may be flagged as being suspect when the purported known sender does not match one of the plurality of known senders and the quantified degree of similarity of the purported known sender to one of the known senders is greater than a threshold value. A perceptible cue may then be generated when the received message has been flagged as being suspect, to alert the recipient that the flagged message is likely illegitimate.
    Type: Application
    Filed: September 22, 2015
    Publication date: March 23, 2017
    Inventor: Sebastien GOUTAL
  • Publication number: 20160352777
    Abstract: A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link comprises a phishing attempt. This determination may comprise comparing features of the link with records stored in a remote database to determine whether the link comprises a phishing attempt. It may be determined that the link comprises a phishing attempt if there is a match. If the compared features do not match the records stored in the remote database, a multi-dimensional input vector may be built from features of the link, which input vector may then be input into a phishing probability engine. The probability that the link comprises a phishing attempt may be computed by the phishing probability engine. Thereafter, the received email may be acted upon according to the computed probability that the link comprises a phishing attempt.
    Type: Application
    Filed: May 26, 2016
    Publication date: December 1, 2016
    Inventor: Sebastien GOUTAL
  • Patent number: 9398047
    Abstract: A method of determining a probability that a received email comprises a phishing attempt may comprise analyzing a link therein to determine whether the link comprises a phishing attempt. This determination may comprise comparing features of the link with records stored in a remote database to determine whether the link comprises a phishing attempt. It may be determined that the link comprises a phishing attempt if there is a match. If the compared features do not match the records stored in the remote database, a multi-dimensional input vector may be built from features of the link, which input vector may then be input into a phishing probability engine. The probability that the link comprises a phishing attempt may be computed by the phishing probability engine. Thereafter, the received email may be acted upon according to the computed probability that the link comprises a phishing attempt.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: July 19, 2016
    Assignee: VADE RETRO TECHNOLOGY, INC.
    Inventor: Sebastien Goutal