The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 15, 2022

Filed:

Jan. 22, 2021
Applicant:

Abnormal Security Corporation, San Francisco, CA (US);

Inventors:

Evan James Reiser, San Francisco, CA (US);

Jeremy Kao, San Francisco, CA (US);

Cheng-Lin Yeh, Menlo Park, CA (US);

Yea So Jung, Oakland, CA (US);

Kai Jing Jiang, San Francisco, CA (US);

Abhijit Bagri, Oakland, CA (US);

Su Li Debbie Tan, San Mateo, CA (US);

Venkatram Krishnamoorthi, San Jose, CA (US);

Fang Shuo Deng, Berkeley, CA (US);

Assignee:

Abnormal Security Corporation, San Francisco, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 16/9035 (2019.01); G06Q 10/10 (2012.01);
U.S. Cl.
CPC ...
H04L 63/1483 (2013.01); G06F 16/9035 (2019.01); G06Q 10/107 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01);
Abstract

Introduced here are computer programs and computer-implemented techniques for discovering malicious emails and then remediating the threat posed by those malicious emails in an automated manner. A threat detection platform may monitor a mailbox to which employees of an enterprise are able to forward emails deemed to be suspicious for analysis. This mailbox may be referred to as an 'abuse mailbox' or 'phishing mailbox.' The threat detection platform can examine emails contained in the abuse mailbox and then determine whether any of those emails represent threats to the security of the enterprise. For example, the threat detection platform may classify each email contained in the abuse mailbox as being malicious or non-malicious. Thereafter, the threat detection platform may determine what remediation actions, if any, are appropriate for addressing the threat posed by those emails determined to be malicious.


Find Patent Forward Citations

Loading…