U.S. patent application number 16/806459 was filed with the patent office on 2020-06-25 for systems and methods for subscription management of specific classification groups based on user's actions.
The applicant listed for this patent is KnowBe4, Inc.. Invention is credited to Alin IRIMIE, Greg KRAS.
Application Number | 20200204586 16/806459 |
Document ID | / |
Family ID | 59581586 |
Filed Date | 2020-06-25 |
![](/patent/app/20200204586/US20200204586A1-20200625-D00000.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00001.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00002.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00003.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00004.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00005.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00006.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00007.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00008.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00009.png)
![](/patent/app/20200204586/US20200204586A1-20200625-D00010.png)
View All Diagrams
United States Patent
Application |
20200204586 |
Kind Code |
A1 |
KRAS; Greg ; et al. |
June 25, 2020 |
SYSTEMS AND METHODS FOR SUBSCRIPTION MANAGEMENT OF SPECIFIC
CLASSIFICATION GROUPS BASED ON USER'S ACTIONS
Abstract
Embodiments of the disclosure describe systems and methods for
selecting a first group of users, which is selected to receive
simulated phishing emails as part of a simulated phishing campaign,
and adding users to a second group of users based upon those
selected users interacting with a simulated phishing email that is
part of a simulated phishing campaign; tracking the completion of
remediation training related to phishing emails by users in the
second group of users and receiving one or more indications that
the users in the second group of users have completed remedial
training; and automatically adding users, who are members of the
second user group, to the first user group, to a third user group,
or to a predetermined user group responsive to the one or more
indications that the users in the second group of users have
completed remedial training.
Inventors: |
KRAS; Greg; (Dunedin,
FL) ; IRIMIE; Alin; (Clearwater, FL) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
KnowBe4, Inc. |
Clearwater |
FL |
US |
|
|
Family ID: |
59581586 |
Appl. No.: |
16/806459 |
Filed: |
March 2, 2020 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
16220502 |
Dec 14, 2018 |
10581911 |
|
|
16806459 |
|
|
|
|
15904109 |
Feb 23, 2018 |
10158668 |
|
|
16220502 |
|
|
|
|
15674757 |
Aug 11, 2017 |
9906555 |
|
|
15904109 |
|
|
|
|
15481041 |
Apr 6, 2017 |
9742803 |
|
|
15674757 |
|
|
|
|
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
G06F 21/56 20130101;
G06F 21/577 20130101; H04L 63/1483 20130101; H04L 63/1433 20130101;
G06F 21/552 20130101 |
International
Class: |
H04L 29/06 20060101
H04L029/06; G06F 21/55 20060101 G06F021/55; G06F 21/56 20060101
G06F021/56; G06F 21/57 20060101 G06F021/57 |
Claims
1. A method comprising: (a) receiving, by one or more processors
coupled to memory, a first indication of a first user interaction
associated with a simulated phishing communication to a user of a
first user group of a plurality of user groups; (b) identifying, by
the one or more processors, a category from a plurality of
categories for the first user interaction, each of the plurality of
categories associated with one or more interactions with one or
more simulated phishing communications and mapped to at least one
of the plurality of user groups; and (c) including, by the one or
more processors, the user in a second user group of the plurality
of user groups mapped to the category, and (d) communicating, by
the one or more processors, a second simulated phishing
communication to the user of the second user group.
2. The method of claim 1, wherein the first user interaction
comprises a number of times the user interacted with simulated
phishing communications.
3. The method of claim 2, wherein (b) further comprises identifying
the category based as least on the number of times reaching a
threshold.
4. The method of claim 1, wherein (b) further comprises
classifying, by the one or more processors, the first user
interaction into the category of a plurality of categories,
5. The method of claim 1, wherein (c) further comprises adding, by
the one or more processors, the user to the second user group while
keeping the user in the first user group.
6. The method of claim 1, wherein (c) further comprises adding, by
the one or more processors, the user to the second user group while
remover the user from the first user group.
7. A system comprising: one or more processors coupled to memory,
and configured to: receive a first indication of a first user
interaction associated with a simulated phishing communication to a
user of a first user group of a plurality of user groups; identify
a category from a plurality of categories for the first user
interaction, each of the plurality of categories associated with
one or more interactions with one or more simulated phishing
communications and mapped to at least one of the plurality of user
groups; and include the user in a second user group of the
plurality of user groups mapped to the category, and communicate a
second simulated phishing communication to the user of the second
user group.
8. The system of claim 7, wherein the first user interaction
comprises a number of times the user interacted with simulated
phishing communications.
9. The system of claim 8, wherein the one or more processors are
configured to identify the category based as least on the number of
times reaching a threshold.
10. The system of claim 7, wherein the one or more processors are
configured to classify the first user interaction into the category
of a plurality of categories,
11. The system of claim 7, wherein the one or more processors are
configured to add the user to the second user group while keeping
the user in the first user group.
12. The system of claim 7, wherein the one or more processors are
configured to add the user to the second user group while remover
the user from the first user group.
13. A method comprising: (a) communicating, by one or more
processors coupled to memory, a first simulated phishing
communication to a user of a first user group of a plurality of
users groups; (b) detecting, by the one or more processors, an
event associated with the first simulated phishing communication to
the user; (c) including, by the one or more processors, the user in
a second user group of the plurality of user groups based at least
on the event, and (d) communicating, by the one or more processors,
a second simulated phishing communication to the user of the second
user group.
14. The method of claim 13, wherein the event comp