Movatterモバイル変換


[0]ホーム

URL:


US20220215093A1 - Event Monitoring - Google Patents

Event Monitoring
Download PDF

Info

Publication number
US20220215093A1
US20220215093A1US17/701,230US202217701230AUS2022215093A1US 20220215093 A1US20220215093 A1US 20220215093A1US 202217701230 AUS202217701230 AUS 202217701230AUS 2022215093 A1US2022215093 A1US 2022215093A1
Authority
US
United States
Prior art keywords
data
event
computing device
action
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/701,230
Inventor
William McMaster
Brian Xu
Sanjay Dorairaj
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Comcast Cable Communications LLC
Original Assignee
Comcast Cable Communications LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Comcast Cable Communications LLCfiledCriticalComcast Cable Communications LLC
Priority to US17/701,230priorityCriticalpatent/US20220215093A1/en
Publication of US20220215093A1publicationCriticalpatent/US20220215093A1/en
Assigned to COMCAST CABLE COMMUNICATIONS, LLCreassignmentCOMCAST CABLE COMMUNICATIONS, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: XU, BRIAN, DORAIRAJ, SANJAY
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A computing device may detect events such as a break-in, fire, flood, movement of people between different areas or zones within a defined area, cyberattacks, movement of devices away from the defined area, etc. If an event is detected, the computing device may take action to protect devices, data on the devices, and/or accounts accessible by the devices. The devices may encrypt, backup data, and/or delete data. The computing device may communicate with other computing devices about events that have been detected.

Description

Claims (30)

What is claimed is:
1. A method comprising:
receiving, by a computing device, information indicating an occurrence of an event; and
based on an association between a location of a user device and a location associated with the event, causing the user device to perform an action to protect data accessible via the user device.
2. The method ofclaim 1, wherein the event comprises at least one of: a cyberattack, detecting malware, disconnecting a device from one or more networks, or unauthorized access to a premises.
3. The method ofclaim 1, wherein the action comprises preventing access to the data via the user device and providing access, via the user device, to second data different from the data.
4. The method ofclaim 1, wherein the computing device is located at a premises, wherein the premises comprises the location associated with the event, and further comprising:
sending, by the computing device to a second computing device located remotely from the premises, a notification indicating the occurrence of the event.
5. The method ofclaim 1, wherein the action comprises one or more of:
encrypting the data;
deleting the data from the user device; or
logging out of one or more accounts that are accessible via the user device.
6. The method ofclaim 1, wherein the event is associated with a premises, wherein the computing device is located at the premises, and wherein the action comprises copying the data to a second computing device located remotely from the premises.
7. The method ofclaim 1, further comprising:
determining, based on the occurrence of the event, the action to protect data accessible via the user device.
8. A method comprising:
receiving, by a first computing device, information indicating an occurrence of a cyberattack;
determining, by the first computing device, based on the occurrence of the cyberattack and a classification of the cyberattack, an action to protect data accessible via a second computing device; and
causing the second computing device to perform the action.
9. The method ofclaim 8, wherein the classification comprises a severity of the cyberattack.
10. The method ofclaim 8, wherein the determining the action to protect the data further comprises:
determining, based on the classification of the cyberattack, the action to protect the data.
11. The method ofclaim 8, further comprising:
determining, based on the classification of the cyberattack, an action to protect data accessible via one or more other computing devices.
12. The method ofclaim 8, wherein the action comprises one or more of: locking the second computing device; encrypting the data; deleting the data; disconnecting the second computing device from one or more networks; disconnecting the second computing device from one or more other computing devices; or storing the data to one or more other computing devices.
13. The method ofclaim 8, wherein the action comprises protecting an account targeted by the cyberattack.
14. The method ofclaim 13, wherein protecting the account comprises one or more of: requesting authentication information associated with the account; logging out of the account on the second computing device; logging out of the account on one or more other computing devices; limiting access to the data via the second computing device; or limiting access to the data via one or more other computing devices.
15. The method ofclaim 8, further comprising:
determining an association between a location of the second computing device and a location associated with the cyberattack, wherein causing the second computing device to perform the action is further based on the association.
16. An apparatus comprising:
one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the apparatus to:
receive information indicating an occurrence of an event; and
based on an association between a location of a user device and a location associated with the event, cause the user device to perform an action to protect data accessible via the user device.
17. The apparatus ofclaim 16, wherein the event comprises at least one of: a cyberattack, detecting malware, disconnecting a device from one or more networks, or unauthorized access to a premises.
18. The apparatus ofclaim 16, wherein the action comprises preventing access to the data via the user device and providing access, via the user device, to second data different from the data.
19. The apparatus ofclaim 16, wherein the apparatus is located at a premises, wherein the premises comprises the location associated with the event, and wherein the instructions, when executed by the one or more processors, cause the apparatus to:
send, to a computing device located remotely from the premises, a notification indicating the occurrence of the event.
20. The apparatus ofclaim 16, wherein the action comprises one or more of:
encrypting the data;
deleting the data from the user device; or
logging out of one or more accounts that are accessible via the user device.
21. The apparatus ofclaim 16, wherein the event is associated with a premises, wherein the apparatus is located at the premises, and wherein the action comprises copying the data to a second computing device located remotely from the premises.
22. The apparatus ofclaim 16, wherein the instructions, when executed by the one or more processors, cause the apparatus to:
determine, based on the occurrence of the event, the action to protect data accessible via the user device.
23. An apparatus comprising:
one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the apparatus to:
receive information indicating an occurrence of a cyberattack;
determine, based on the occurrence of the cyberattack and a classification of the cyberattack, an action to protect data accessible via a computing device; and
causing the computing device to perform the action.
24. The apparatus ofclaim 23, wherein the classification comprises a severity of the cyberattack.
25. The apparatus ofclaim 23, wherein the instructions, when executed by the one or more processors, cause the apparatus to determine the action to protect the data by causing:
determining, based on the classification of the cyberattack, the action to protect the data.
26. The apparatus ofclaim 23, wherein the instructions, when executed by the one or more processors, cause the apparatus to:
determine, based on the classification of the cyberattack, an action to protect data accessible via one or more other computing devices.
27. The apparatus ofclaim 23, wherein the action comprises one or more of: locking the computing device; encrypting the data; deleting the data; disconnecting the computing device from one or more networks; disconnecting the computing device from one or more other computing devices; or storing the data to one or more other computing devices.
28. The apparatus ofclaim 23, wherein the action comprises protecting an account targeted by the cyberattack.
29. The apparatus ofclaim 28, wherein protecting the account comprises one or more of: requesting authentication information associated with the account; logging out of the account on the computing device; logging out of the account on one or more other computing devices; limiting access to the data via the computing device; or limiting access to the data via one or more other computing devices.
30. The apparatus ofclaim 23, wherein the instructions, when executed by the one or more processors, cause the apparatus to:
determine an association between a location of the computing device and a location associated with the cyberattack, wherein causing the computing device to perform the action is further based on the association.
US17/701,2302018-10-102022-03-22Event MonitoringPendingUS20220215093A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/701,230US20220215093A1 (en)2018-10-102022-03-22Event Monitoring

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US16/156,554US11314858B2 (en)2018-10-102018-10-10Event monitoring
US17/701,230US20220215093A1 (en)2018-10-102022-03-22Event Monitoring

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/156,554ContinuationUS11314858B2 (en)2018-10-102018-10-10Event monitoring

Publications (1)

Publication NumberPublication Date
US20220215093A1true US20220215093A1 (en)2022-07-07

Family

ID=70155998

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US16/156,554Active2039-12-22US11314858B2 (en)2018-10-102018-10-10Event monitoring
US17/701,230PendingUS20220215093A1 (en)2018-10-102022-03-22Event Monitoring

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US16/156,554Active2039-12-22US11314858B2 (en)2018-10-102018-10-10Event monitoring

Country Status (2)

CountryLink
US (2)US11314858B2 (en)
CA (1)CA3058105A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB2627056A (en)*2022-12-082024-08-14Electro Rent CorpSystems, devices, and methods for tracking remote equipment location and utilization of computing devices

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11314858B2 (en)*2018-10-102022-04-26Comcast Cable Communications, LlcEvent monitoring
US11206306B2 (en)*2019-05-212021-12-21Cobalt Iron, Inc.Analytics based cloud brokering of data protection operations system and method
EP4206959B1 (en)*2021-12-302025-04-30Ningbo Geely Automobile Research & Development Co. Ltd.A method for protecting data of a user in a vehicle and a vehicle
CN115037536B (en)*2022-06-022024-07-05河北金锁安防工程股份有限公司Security information management is with preventing early warning platform that data is lost based on big data
US20240028747A1 (en)*2022-07-202024-01-25Micron Technology, Inc.Preventing access to data based on locations
CN116740907A (en)*2023-05-122023-09-12广西电网有限责任公司电力科学研究院Identification method and system of electric public safety hidden danger

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7506166B2 (en)*1999-05-172009-03-17Invicta Networks, Inc.Method of communications and communication network intrusion protection methods and intrusion attempt detection system
US7663479B1 (en)*2005-12-212010-02-16At&T Corp.Security infrastructure
US20130305369A1 (en)*2012-05-142013-11-14ZimperiumDetection of threats to networks, based on geographic location
US20170195356A1 (en)*2010-11-292017-07-06Biocatch Ltd.Identification of computerized bots and automated cyber-attack modules
US20180063190A1 (en)*2016-08-232018-03-01Duo Security, Inc.Method for identifying phishing websites and hindering associated activity
US10601860B2 (en)*2016-03-112020-03-24The Toronto-Dominion BankApplication platform security enforcement in cross device and ownership structures
US10824741B1 (en)*2017-03-152020-11-03Alarm.Com IncorporatedDevice lockdown
US11314858B2 (en)*2018-10-102022-04-26Comcast Cable Communications, LlcEvent monitoring
US11550950B2 (en)*2018-05-132023-01-10Richard Jay LangleyIndividual data unit and methods and systems for enhancing the security of user data
US11777992B1 (en)*2020-04-082023-10-03Wells Fargo Bank, N.A.Security model utilizing multi-channel data

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6970081B1 (en)1998-09-172005-11-29Koninklijke Philips Electronics N.V.Distributed software controlled theft detection
US7103915B2 (en)*2000-11-132006-09-05Digital Doors, Inc.Data security system and method
US6715085B2 (en)*2002-04-182004-03-30International Business Machines CorporationInitializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
US7793355B2 (en)*2002-12-122010-09-07Reasearch In Motion LimitedSystem and method of owner control of electronic devices
US20050021980A1 (en)*2003-06-232005-01-27Yoichi KanaiAccess control decision system, access control enforcing system, and security policy
US8176320B1 (en)*2003-09-112012-05-08Voice Signals LlcSystem and method for data access and control
US8613107B2 (en)*2005-03-162013-12-17Dt Labs Development, LlcSystem, method and apparatus for electronically protecting data associated with RFID tags
US20070090944A1 (en)2005-10-252007-04-26Du Breuil Thomas LHome-monitoring system
US20070143857A1 (en)2005-12-192007-06-21Hazim AnsariMethod and System for Enabling Computer Systems to Be Responsive to Environmental Changes
US7917963B2 (en)*2006-08-092011-03-29Antenna Vaultus, Inc.System for providing mobile data security
US8966580B2 (en)*2008-05-012015-02-24Sandisk Il Ltd.System and method for copying protected data from one secured storage device to another via a third party
US8542833B2 (en)*2010-06-122013-09-24Bao TranSystems and methods to secure laptops or portable computing devices
US20120309354A1 (en)2011-06-062012-12-06Syracuse UniversitySituation aware security system and method for mobile devices
US8978157B2 (en)*2012-05-092015-03-10Ricoh Company, Ltd.Managing access to data based on device attribute information
US9208676B2 (en)2013-03-142015-12-08Google Inc.Devices, methods, and associated information processing for security in a smart-sensored home
US9432361B2 (en)2013-03-132016-08-30Lookout, Inc.System and method for changing security behavior of a device based on proximity to another device
US10530720B2 (en)*2015-08-272020-01-07Mcafee, LlcContextual privacy engine for notifications

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7506166B2 (en)*1999-05-172009-03-17Invicta Networks, Inc.Method of communications and communication network intrusion protection methods and intrusion attempt detection system
US7663479B1 (en)*2005-12-212010-02-16At&T Corp.Security infrastructure
US20170195356A1 (en)*2010-11-292017-07-06Biocatch Ltd.Identification of computerized bots and automated cyber-attack modules
US20130305369A1 (en)*2012-05-142013-11-14ZimperiumDetection of threats to networks, based on geographic location
US10601860B2 (en)*2016-03-112020-03-24The Toronto-Dominion BankApplication platform security enforcement in cross device and ownership structures
US20180063190A1 (en)*2016-08-232018-03-01Duo Security, Inc.Method for identifying phishing websites and hindering associated activity
US10824741B1 (en)*2017-03-152020-11-03Alarm.Com IncorporatedDevice lockdown
US11550950B2 (en)*2018-05-132023-01-10Richard Jay LangleyIndividual data unit and methods and systems for enhancing the security of user data
US11314858B2 (en)*2018-10-102022-04-26Comcast Cable Communications, LlcEvent monitoring
US11777992B1 (en)*2020-04-082023-10-03Wells Fargo Bank, N.A.Security model utilizing multi-channel data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB2627056A (en)*2022-12-082024-08-14Electro Rent CorpSystems, devices, and methods for tracking remote equipment location and utilization of computing devices
GB2627056B (en)*2022-12-082025-05-28Electro Rent CorpSystems, devices, and methods for tracking remote equipment location and utilization of computing devices

Also Published As

Publication numberPublication date
US20200117798A1 (en)2020-04-16
US11314858B2 (en)2022-04-26
CA3058105A1 (en)2020-04-10

Similar Documents

PublicationPublication DateTitle
US20220215093A1 (en)Event Monitoring
JP6198231B2 (en) Security policy for device data
US10491630B2 (en)System and method for providing data-driven user authentication misuse detection
US8688980B2 (en)Trust verification schema based transaction authorization
US20160065594A1 (en)Intrusion detection platform
US11102245B2 (en)Deception using screen capture
US20140380475A1 (en)User centric fraud detection
US20130133054A1 (en)Relationship Based Trust Verification Schema
US10225249B2 (en)Preventing unauthorized access to an application server
US20130191887A1 (en)Social network based trust verification Schema
US10542044B2 (en)Authentication incident detection and management
US9769213B1 (en)Method and system for secure digital object management
RU2691228C2 (en)Cancellation protection of possible confidential data elements
US10637864B2 (en)Creation of fictitious identities to obfuscate hacking of internal networks
US10015768B1 (en)Systems and methods for locating unrecognized computing devices
US20240430257A1 (en)Continuous multifactor authentication system integration with corporate security systems
US20240232326A9 (en)Sentinel system for an online device
US10447736B1 (en)Systems and methods for providing security in smart buildings
WO2016164210A1 (en)Electronic preemptive evidentiary escrow platform
US10924496B1 (en)Systems and methods for managing location-based access control lists
GB2535579A (en)Preventing unauthorized access to an application server
US9172719B2 (en)Intermediate trust state
US10382488B1 (en)Systems and methods for enforcing access-control policies
CN114915473B (en)Server intrusion processing method and related device
CN112019876B (en)Video access method, device, storage server and video access system

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:COMCAST CABLE COMMUNICATIONS, LLC, PENNSYLVANIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:XU, BRIAN;DORAIRAJ, SANJAY;SIGNING DATES FROM 20210127 TO 20210219;REEL/FRAME:063686/0439

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION COUNTED, NOT YET MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp