SECURITY THREAT INFORMATION ANALYSIS
A computer-implemented method including determining, by one or more computers in an analysis system, one or more intelligence types, categorizing, by at least one of the computers and for each dataset from multiple datasets that each include information about potential security threats, each subset...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | SCHALL, Stephen A MODI, Shimon |
description | A computer-implemented method including determining, by one or more computers in an analysis system, one or more intelligence types, categorizing, by at least one of the computers and for each dataset from multiple datasets that each include information about potential security threats, each subset of data for the respective dataset, the categorizing including identifying, by at least one of the computers and for each of the subsets of data in the respective dataset, an intelligence type that categorizes the subset of data, and associating, by at least one of the computers and for each of the subsets of data in the respective dataset, the subset of data with the corresponding intelligence type, determining, by at least one of the computers and for each of the categorized subsets, whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a first subset from the categorized subsets does not include information about the same threat as a second different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a third subset from the categorized subsets includes information about the same threat as a fourth different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, a group of the subsets that include particular data a third party system should receive from the analysis system, including determining, for a first third party system, a first group includes the first subset, and determining, for a second third party system, a second group that includes the third subset and does not include the fourth subset, assigning, by at least one of the computers and for each subset in each of the groups, a priority to the respective subset, and sending, by at least one of the computers and to a third party system, the subsets in the group of the subsets using the respective priorities including sending, to the first third party system, the subsets in the first group, including the first subset, using the respective priorities, and sending, to the second third party system, the subsets in the second group, including the third subset, using the respective priorities. Page 1 of 7 100 Proprietary Threat Open Sources E |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_AU2016247167BB2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AU2016247167BB2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_AU2016247167BB23</originalsourceid><addsrcrecordid>eNrjZFAJdnUODfIMiVQI8QhydQxR8PRz8w_ydQzx9PdTcPRz9IkM9gzmYWBNS8wpTuWF0twMKm6uIc4euqkF-fGpxQWJyal5qSXxjqFGBoZmRibmhmbmTk5GxkQqAwB1liS3</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SECURITY THREAT INFORMATION ANALYSIS</title><source>esp@cenet</source><creator>SCHALL, Stephen A ; MODI, Shimon</creator><creatorcontrib>SCHALL, Stephen A ; MODI, Shimon</creatorcontrib><description>A computer-implemented method including determining, by one or more computers in an analysis system, one or more intelligence types, categorizing, by at least one of the computers and for each dataset from multiple datasets that each include information about potential security threats, each subset of data for the respective dataset, the categorizing including identifying, by at least one of the computers and for each of the subsets of data in the respective dataset, an intelligence type that categorizes the subset of data, and associating, by at least one of the computers and for each of the subsets of data in the respective dataset, the subset of data with the corresponding intelligence type, determining, by at least one of the computers and for each of the categorized subsets, whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a first subset from the categorized subsets does not include information about the same threat as a second different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a third subset from the categorized subsets includes information about the same threat as a fourth different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, a group of the subsets that include particular data a third party system should receive from the analysis system, including determining, for a first third party system, a first group includes the first subset, and determining, for a second third party system, a second group that includes the third subset and does not include the fourth subset, assigning, by at least one of the computers and for each subset in each of the groups, a priority to the respective subset, and sending, by at least one of the computers and to a third party system, the subsets in the group of the subsets using the respective priorities including sending, to the first third party system, the subsets in the first group, including the first subset, using the respective priorities, and sending, to the second third party system, the subsets in the second group, including the third subset, using the respective priorities. Page 1 of 7 100 Proprietary Threat Open Sources Exchange Source 102a 102b Data102c Data sources T, <Receive data 104a4 104b T2 Intelligence Intelligence Parse data Type X Intelligence Type Y Type Y Determine 104a whether some T3 104b - of the parsed T< Th data is related Threat A to the same threat Data Construct m Data Construct n diMerge,or T4 relate data 106a 106b for the same threat Third Party A Third Party B Identify Third T5 Rule 1a Rule lb for security Rule 2a 108a 108b threat -- i -- information Data Construct Data Construct Send security T6 m 106a n 106b threat TYs- information to Third Party A Third Party B Third Parties 11Qa 110b|</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20171214&DB=EPODOC&CC=AU&NR=2016247167B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20171214&DB=EPODOC&CC=AU&NR=2016247167B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SCHALL, Stephen A</creatorcontrib><creatorcontrib>MODI, Shimon</creatorcontrib><title>SECURITY THREAT INFORMATION ANALYSIS</title><description>A computer-implemented method including determining, by one or more computers in an analysis system, one or more intelligence types, categorizing, by at least one of the computers and for each dataset from multiple datasets that each include information about potential security threats, each subset of data for the respective dataset, the categorizing including identifying, by at least one of the computers and for each of the subsets of data in the respective dataset, an intelligence type that categorizes the subset of data, and associating, by at least one of the computers and for each of the subsets of data in the respective dataset, the subset of data with the corresponding intelligence type, determining, by at least one of the computers and for each of the categorized subsets, whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a first subset from the categorized subsets does not include information about the same threat as a second different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a third subset from the categorized subsets includes information about the same threat as a fourth different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, a group of the subsets that include particular data a third party system should receive from the analysis system, including determining, for a first third party system, a first group includes the first subset, and determining, for a second third party system, a second group that includes the third subset and does not include the fourth subset, assigning, by at least one of the computers and for each subset in each of the groups, a priority to the respective subset, and sending, by at least one of the computers and to a third party system, the subsets in the group of the subsets using the respective priorities including sending, to the first third party system, the subsets in the first group, including the first subset, using the respective priorities, and sending, to the second third party system, the subsets in the second group, including the third subset, using the respective priorities. Page 1 of 7 100 Proprietary Threat Open Sources Exchange Source 102a 102b Data102c Data sources T, <Receive data 104a4 104b T2 Intelligence Intelligence Parse data Type X Intelligence Type Y Type Y Determine 104a whether some T3 104b - of the parsed T< Th data is related Threat A to the same threat Data Construct m Data Construct n diMerge,or T4 relate data 106a 106b for the same threat Third Party A Third Party B Identify Third T5 Rule 1a Rule lb for security Rule 2a 108a 108b threat -- i -- information Data Construct Data Construct Send security T6 m 106a n 106b threat TYs- information to Third Party A Third Party B Third Parties 11Qa 110b|</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFAJdnUODfIMiVQI8QhydQxR8PRz8w_ydQzx9PdTcPRz9IkM9gzmYWBNS8wpTuWF0twMKm6uIc4euqkF-fGpxQWJyal5qSXxjqFGBoZmRibmhmbmTk5GxkQqAwB1liS3</recordid><startdate>20171214</startdate><enddate>20171214</enddate><creator>SCHALL, Stephen A</creator><creator>MODI, Shimon</creator><scope>EVB</scope></search><sort><creationdate>20171214</creationdate><title>SECURITY THREAT INFORMATION ANALYSIS</title><author>SCHALL, Stephen A ; MODI, Shimon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_AU2016247167BB23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>SCHALL, Stephen A</creatorcontrib><creatorcontrib>MODI, Shimon</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SCHALL, Stephen A</au><au>MODI, Shimon</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SECURITY THREAT INFORMATION ANALYSIS</title><date>2017-12-14</date><risdate>2017</risdate><abstract>A computer-implemented method including determining, by one or more computers in an analysis system, one or more intelligence types, categorizing, by at least one of the computers and for each dataset from multiple datasets that each include information about potential security threats, each subset of data for the respective dataset, the categorizing including identifying, by at least one of the computers and for each of the subsets of data in the respective dataset, an intelligence type that categorizes the subset of data, and associating, by at least one of the computers and for each of the subsets of data in the respective dataset, the subset of data with the corresponding intelligence type, determining, by at least one of the computers and for each of the categorized subsets, whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a first subset from the categorized subsets does not include information about the same threat as a second different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, that a third subset from the categorized subsets includes information about the same threat as a fourth different subset in response to determining whether the respective subset does not include information about the same threat as a different subset, determining, by at least one of the computers, a group of the subsets that include particular data a third party system should receive from the analysis system, including determining, for a first third party system, a first group includes the first subset, and determining, for a second third party system, a second group that includes the third subset and does not include the fourth subset, assigning, by at least one of the computers and for each subset in each of the groups, a priority to the respective subset, and sending, by at least one of the computers and to a third party system, the subsets in the group of the subsets using the respective priorities including sending, to the first third party system, the subsets in the first group, including the first subset, using the respective priorities, and sending, to the second third party system, the subsets in the second group, including the third subset, using the respective priorities. Page 1 of 7 100 Proprietary Threat Open Sources Exchange Source 102a 102b Data102c Data sources T, <Receive data 104a4 104b T2 Intelligence Intelligence Parse data Type X Intelligence Type Y Type Y Determine 104a whether some T3 104b - of the parsed T< Th data is related Threat A to the same threat Data Construct m Data Construct n diMerge,or T4 relate data 106a 106b for the same threat Third Party A Third Party B Identify Third T5 Rule 1a Rule lb for security Rule 2a 108a 108b threat -- i -- information Data Construct Data Construct Send security T6 m 106a n 106b threat TYs- information to Third Party A Third Party B Third Parties 11Qa 110b|</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_AU2016247167BB2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | SECURITY THREAT INFORMATION ANALYSIS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T09%3A53%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SCHALL,%20Stephen%20A&rft.date=2017-12-14&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EAU2016247167BB2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |