Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security threat information gathering and incident reporting systems and methods

a technology for threat information and incident reporting, applied in the security field, can solve the problems of little intelligence collection and short analysis time, and achieve the effect of enhancing client communication and collaboration and a higher level of cyber security

Inactive Publication Date: 2020-10-15
FINDLAY VALARIE ANN
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a system called Threat Reporting and Response Database (TRRD) that collects and analyzes data from external sources and client incidents to enhance threat identification and mitigation. This system provides secure, encrypted data gathering and real-time reporting of sector and platform-specific cyber threats to clients, allowing for faster responses to new threats and improved collaboration. The technical effects include faster response times to new threats and improved cyber security for clients.

Problems solved by technology

Currently, much of the data gathering from security breaches stops short of analysis, little intelligence is collected, even less is shared and most countermeasures rely heavily on technological solutions and specialized resources and contractors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security threat information gathering and incident reporting systems and methods
  • Security threat information gathering and incident reporting systems and methods
  • Security threat information gathering and incident reporting systems and methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059]The present invention is directed to security and more particularly to threat information gathering, threat risk assessment, threat risk analysis, incident reporting, and information classification, codifying and sharing.

[0060]The ensuing description provides representative embodiment(s) only, and is not intended to limit the scope, applicability or configuration of the disclosure. Rather, the ensuing description of the embodiment(s) will provide those skilled in the art with an enabling description for implementing an embodiment or embodiments of the invention. It being understood that various changes can be made in the function and arrangement of elements without departing from the spirit and scope as set forth in the appended claims. Accordingly, an embodiment is an example or implementation of the inventions and not the sole implementation. Various appearances of “one embodiment,”“an embodiment” or “some embodiments” do not necessarily all refer to the same embodiments. Al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A common misconception equates information with intelligence. To transform information into intelligence a number of analytical steps must occur within a framework designed to yield very specific datum associable with other raw or formulated datum, that provides an answer or solution to a sub-problem. Every organization has threats and risks including cyber threats, threats to infrastructure, etc. that can impact the organization on many levels. However, most organizations do not understand how to quantify and assess these risks / threats yet alone assess different preemptive actions for mitigating impact. It would therefore be beneficial to provide organizations with a software based system that provides threat information gathering, incident reporting, and asset identification / valuation as part of its compounded intelligence and supports predictive context specific analysis of risks and countermeasures. Further, distributed countermeasure monitoring provides incident levels of known and unknown, or yet to be categorized threats.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This patent application is a continuation of U.S. patent application Ser. No. 15 / 609,599 filed May 31, 2017 which claims the benefit of U.S. Provisional Patent Application 62 / 343,300 filed May 31, 2016 entitled “Security Threat Information Gathering and Incident Reporting Systems and Methods”, the contents of which are incorporated herein by reference.FIELD OF THE INVENTION[0002]This invention relates to security and more particularly to threat information gathering, threat risk assessment, threat risk analysis, incident reporting, and information classification, codifying and sharing.BACKGROUND OF THE INVENTION[0003]Computer security, also known as cybersecurity or IT security, relates to the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Cyber security includes controlling physical access to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1441H04L63/20
Inventor FINDLAY, VALARIE ANN
Owner FINDLAY VALARIE ANN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products