Patents by Inventor William A. Patton

William A. Patton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11847579
    Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.
    Type: Grant
    Filed: March 6, 2023
    Date of Patent: December 19, 2023
    Assignee: KnowBe4, Inc.
    Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
  • Patent number: 11729206
    Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. One or more email accounts of the email system with the security system may be identified to use for a delivery verification campaign. Further, one or more types of simulated phishing communications may be selected from a plurality of types of simulated phishing communications. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to the one or more email accounts. Further, whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.
    Type: Grant
    Filed: January 9, 2023
    Date of Patent: August 15, 2023
    Assignee: KnowBe4, Inc.
    Inventors: Mark William Patton, Daniel Cormier, Greg Kras
  • Publication number: 20230214687
    Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.
    Type: Application
    Filed: March 6, 2023
    Publication date: July 6, 2023
    Applicant: KnowBe4, Inc.
    Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
  • Patent number: 11599810
    Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.
    Type: Grant
    Filed: February 23, 2021
    Date of Patent: March 7, 2023
    Assignee: KnowBe4, Inc.
    Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
  • Publication number: 20230038258
    Abstract: Systems and methods are disclosed for analysis of user behavior data to improve security awareness. User behavior data of an organization is received from one or more agents on endpoint devices accessed by the users and using the user behavior data, one or more risk scores representative of the severity of risk associated with the user behavior of the users are determined. Based on the one or more risk scores representative of the severity of risk associated with the user behavior of the users, the behavior of the is determined to pose a security risk to the organization, In response to the determination that the user behavior of the users of the organization poses a security risk to the organization, electronic security awareness training is delivered to the users.
    Type: Application
    Filed: July 28, 2022
    Publication date: February 9, 2023
    Applicant: KnowBe4, Inc.
    Inventor: Mark William Patton
  • Patent number: 11552982
    Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. One or more email accounts of the email system with the security system may be identified to use for a delivery verification campaign. Further, one or more types of simulated phishing communications may be selected from a plurality of types of simulated phishing communications. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to the one or more email accounts. Further, whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.
    Type: Grant
    Filed: August 24, 2020
    Date of Patent: January 10, 2023
    Assignee: KnowBe4, Inc.
    Inventors: Mark William Patton, Daniel Cormier, Greg Kras
  • Publication number: 20220166784
    Abstract: Systems and methods are described for identifying other instances of messages corresponding to a reported malicious message. A report of a malicious message from a user of a plurality users using a messaging system is received. Responsive to the report of the malicious message, plain text of content selected from the malicious message is provided. Thereafter, one or more segments of the plain text are selected as key content for construction of a search. A search is then executed in the messaging system for one or more other malicious messages corresponding to the reported malicious message using the selected one or more segments of the plain text with one or more match criteria or no criteria. The one or more other malicious messages corresponding to the reported malicious message are identified in the messaging system.
    Type: Application
    Filed: November 17, 2021
    Publication date: May 26, 2022
    Applicant: KnowBe4, Inc.
    Inventors: Mark William Patton, Steffan Perry, Amanda Lewis
  • Publication number: 20220067552
    Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.
    Type: Application
    Filed: February 23, 2021
    Publication date: March 3, 2022
    Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
  • Publication number: 20220060495
    Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. One or more email accounts of the email system with the security system may be identified to use for a delivery verification campaign. Further, one or more types of simulated phishing communications may be selected from a plurality of types of simulated phishing communications. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to the one or more email accounts. Further, whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.
    Type: Application
    Filed: August 24, 2020
    Publication date: February 24, 2022
    Inventors: Mark William Patton, Daniel Cormier, Greg Kras
  • Patent number: 11038914
    Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to one or more email accounts. It is determined whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.
    Type: Grant
    Filed: February 15, 2021
    Date of Patent: June 15, 2021
    Assignee: KnowBe4, Inc.
    Inventors: Mark William Patton, Daniel Cormier, Greg Kras
  • Patent number: 10949760
    Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: March 16, 2021
    Assignee: KnowBe4, Inc.
    Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
  • Patent number: 10917429
    Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to one or more email accounts. It is determined whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.
    Type: Grant
    Filed: August 25, 2020
    Date of Patent: February 9, 2021
    Assignee: KnowBe4, Inc.
    Inventors: Mark William Patton, Daniel Cormier, Greg Kras
  • Patent number: 10257232
    Abstract: An endpoint security agent facilitates a security policy on an endpoint computing device. The endpoint agent comprises an engine and one or more plugins that each provide a particular security feature. The endpoint agent receives a policy from a cloud server specifying one or more plug-ins used by the policy and configuration of those plug-ins. The endpoint agent retrieves, installs, and configures the one or more plugins. The endpoint agent updates a communication table with command subscription information obtained from each installed plugin indicating command types subscribed to by each plug-in. When a command is received, a lookup of the command type is performed in the table, and the command is sent to the subscribing plugin.
    Type: Grant
    Filed: September 13, 2017
    Date of Patent: April 9, 2019
    Assignee: Malwarebytes Inc.
    Inventors: Kevin Douglas Breton, Mark William Patton
  • Patent number: 10250623
    Abstract: A security server tracks malicious objects detected by malware detection applications that scan for malicious objects on clients. The security server also receives client information from the clients indicating client states. The client state describes one or more protection applications executing on the client that seek to identify and prevent malicious objects from taking malicious actions based on real-time monitoring. Thus, the security server may identify when the protection application fails to detect a malicious object. In addition, the security server maps detection events of malicious objects with corresponding client states to generate aggregate detection information for a population of clients. Analytical data can be derived from the aggregate detection information to identify trends useful for evaluating different types of protection applications.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: April 2, 2019
    Assignee: Malwarebytes, Inc.
    Inventors: Mark William Patton, Darren Kazuo Chinen, Braydon Michael Davis, Ragesh Damodaran, Manikandan Vellore Muneeswaran, Vijay Arumugam Velayutham
  • Publication number: 20190081982
    Abstract: An endpoint security agent facilitates a security policy on an endpoint computing device. The endpoint agent comprises an engine and one or more plugins that each provide a particular security feature. The endpoint agent receives a policy from a cloud server specifying one or more plug-ins used by the policy and configuration of those plug-ins. The endpoint agent retrieves, installs, and configures the one or more plugins. The endpoint agent updates a communication table with command subscription information obtained from each installed plugin indicating command types subscribed to by each plug-in. When a command is received, a lookup of the command type is performed in the table, and the command is sent to the subscribing plugin.
    Type: Application
    Filed: September 13, 2017
    Publication date: March 14, 2019
    Inventors: Kevin Douglas Breton, Mark William Patton
  • Patent number: 10229269
    Abstract: An anti-malware application detects and remediates ransomware. The anti-malware application monitors processes executing on a computing device and detects that a process is opening a file for editing. A portion of the original file is saved prior to being edited by the process. Once the edited file is saved, the anti-malware application compares a portion of the edited file to the portion of the original file to determine if the edited file is encrypted. The anti-malware application may determine the process is associated with ransomware based on whether the edited file is encrypted.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: March 12, 2019
    Assignee: Malwarebytes Inc.
    Inventors: Mark William Patton, Zohiartze Herce San Martín, Jorge Alejandro Duran Royo, Sherab Giovannini
  • Patent number: 10193918
    Abstract: An anti-malware application analyzes behavior of an executing process to identify ransomware. The anti-malware application detects an untrusted process requesting enumeration of a directory of user files and causes the untrusted process to initially operate on a decoy file that mimics the user files. If the behavior of the untrusted process with respect to the decoy file is indicative of ransomware, the process can be terminated without loss of the user files. The decoy file may be deployed in a way that is undetectable to the user.
    Type: Grant
    Filed: March 28, 2018
    Date of Patent: January 29, 2019
    Assignee: Malwarebytes Inc.
    Inventors: Mark William Patton, Nathan Scott, Ramon Royo Gutierrez, Sherab Giovannini
  • Publication number: 20180211040
    Abstract: An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and detects behaviors that conform to a predefined set of behaviors indicative of ransomware. Responsive to detecting these behaviors, indicators are stored to a log in a storage device. Each of the indicators in the log is associated with respective scores. A running score for each thread is generated by combining the respective scores of the indicators in the log. Responsive to determining that the running score exceeds a predefined threshold score, execution of the thread is terminated. The source ransomware file is then identified and quarantined.
    Type: Application
    Filed: July 5, 2017
    Publication date: July 26, 2018
    Inventors: Mark William Patton, Ares Lopez Ituiño
  • Patent number: 10032025
    Abstract: An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and detects behaviors that conform to a predefined set of behaviors indicative of ransomware. Responsive to detecting these behaviors, indicators are stored to a log in a storage device. Each of the indicators in the log is associated with respective scores. A running score for each thread is generated by combining the respective scores of the indicators in the log. Responsive to determining that the running score exceeds a predefined threshold score, execution of the thread is terminated. The source ransomware file is then identified and quarantined.
    Type: Grant
    Filed: July 5, 2017
    Date of Patent: July 24, 2018
    Assignee: Malwarebytes Inc.
    Inventors: Mark William Patton, Ares Lopez Ituiño
  • Patent number: 9734337
    Abstract: An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and detects behaviors that conform to a predefined set of behaviors indicative of ransomware. Responsive to detecting these behaviors, indicators are stored to a log in a storage device. Each of the indicators in the log is associated with respective scores. A running score for each thread is generated by combining the respective scores of the indicators in the log. Responsive to determining that the running score exceeds a predefined threshold score, execution of the thread is terminated. The source ransomware file is then identified and quarantined.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: August 15, 2017
    Assignee: Malwarebytes Inc.
    Inventors: Mark William Patton, Ares Lopez Ituiño