US 12,069,083 B2
Assessing security risks of users in a computing network
Trevor Tyler Hawthorn, Ashburn, VA (US); Norman Sadeh-Koniecpol, Pittsburgh, PA (US); Nathan Miller, Haymarket, VA (US); Jeff Losapio, Herndon, VA (US); Kurt Frederick Wescoe, Pittsburgh, PA (US); Jason R. Brubaker, East Berlin, PA (US); and Jason Hong, Pittsburgh, PA (US)
Assigned to Proofpoint, Inc., Sunnyvale, CA (US)
Filed by Proofpoint, Inc., Sunnyvale, CA (US)
Filed on Mar. 14, 2022, as Appl. No. 17/693,838.
Application 17/693,838 is a continuation of application No. 16/910,801, filed on Jun. 24, 2020, granted, now 11,310,261.
Application 16/910,801 is a continuation of application No. 15/492,396, filed on Apr. 20, 2017, granted, now 10,749,887, issued on Aug. 18, 2020.
Application 15/492,396 is a continuation in part of application No. 15/418,867, filed on Jan. 30, 2017, granted, now 9,870,715, issued on Jan. 16, 2018.
Application 15/492,396 is a continuation in part of application No. 14/620,866, filed on Feb. 12, 2015, abandoned.
Application 15/418,867 is a continuation of application No. 14/216,002, filed on Mar. 17, 2014, granted, now 9,558,677, issued on Jan. 31, 2017.
Application 14/216,002 is a continuation in part of application No. 13/832,070, filed on Mar. 15, 2013, granted, now 9,280,911, issued on Mar. 8, 2016.
Application 14/216,002 is a continuation in part of application No. 13/442,587, filed on Apr. 9, 2012, granted, now 9,547,998, issued on Jan. 17, 2017.
Application 13/832,070 is a continuation of application No. 13/442,587, filed on Apr. 9, 2012, granted, now 9,547,998, issued on Jan. 17, 2017.
Claims priority of provisional application 61/939,450, filed on Feb. 13, 2014.
Claims priority of provisional application 61/793,011, filed on Mar. 15, 2013.
Claims priority of provisional application 61/473,366, filed on Apr. 8, 2011.
Claims priority of provisional application 61/473,384, filed on Apr. 8, 2011.
Prior Publication US 2022/0210181 A1, Jun. 30, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/55 (2013.01)
CPC H04L 63/1433 (2013.01) [G06F 21/55 (2013.01); H04L 63/1408 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
at a security system comprising at least one processor and memory:
generating an interaction item, wherein the interaction item comprises one or more of a training item or a security item;
transmitting the interaction item to an end user electronic device via a network;
receiving feedback data from the end user electronic device,
wherein the feedback data comprises sensed data relating to an action of a user of the end user electronic device associated with the interaction item, and
wherein the feedback data comprises technical information associated with the end user electronic device;
comparing the feedback data to a plurality of security risk scoring metrics;
based on comparing the feedback data to the plurality of security risk scoring metrics, determining a security risk score, wherein the security risk score quantifies a cybersecurity risk presented by the user of the end user electronic device;
generating a subsequent interaction item based on the security risk score, wherein the subsequent interaction item comprises one or more of a training item or a security item; and
transmitting the subsequent interaction item to the end user electronic device via the network.