Movatterモバイル変換


[0]ホーム

URL:


US20220300659A1 - Data breach prevention and remediation - Google Patents

Data breach prevention and remediation
Download PDF

Info

Publication number
US20220300659A1
US20220300659A1US17/836,923US202217836923AUS2022300659A1US 20220300659 A1US20220300659 A1US 20220300659A1US 202217836923 AUS202217836923 AUS 202217836923AUS 2022300659 A1US2022300659 A1US 2022300659A1
Authority
US
United States
Prior art keywords
threat
data
parameter
compromised
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/836,923
Inventor
Jason Britt
Patrick A. Westerhaus
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cyber Team Six LLC
Original Assignee
Cyber Team Six LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cyber Team Six LLCfiledCriticalCyber Team Six LLC
Priority to US17/836,923priorityCriticalpatent/US20220300659A1/en
Publication of US20220300659A1publicationCriticalpatent/US20220300659A1/en
Assigned to Cyber Team SixreassignmentCyber Team SixASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BRITT, Jason, WESTERHAUS, PATRICK A.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Computer-implemented threat detection method and systems are provided. The method comprises discovering threat data associated with a first entity, translating the threat data to one or more threat models, translating the one or more threat models, using a threat model parameter generator, to at least a parameter threat model and translating the parameter threat model to one or more identification queries. The one or more identification queries may be executed and the generated results may be translated to result data in a first format. The one or more result data models may be published from the result data in one or more formats or to one or more locations.

Description

Claims (20)

What is claimed is:
1. A computer-implemented system comprising one or more processors for communicating with one or more databases to transmit threat-related data, the one or more processors executing logic code that causes the computer-implemented system to:
discover threat data associated with a first entity, the threat data including indicators of a data security breach, wherein a threat model parameter generator translates the threat data to at least a parameter threat model with one or more parameters;
translate the threat model parameter to one or more identification queries based on one or more configurations stored on one or more databases;
execute the one or more identification queries to generate first results; and
format the first results to one or more data formats that are used to identify at least one threat target for the first entity based on the one or more parameters in the parameter threat model.
2. The system ofclaim 1, wherein the first results comprise at least one of the first entity's unique customer identifier, a compromise timestamp, a threat tag, an attribution tag, a provider tag or a feed tag.
3. The system ofclaim 1, wherein the threat data indicators are associated with at least one of partial account information, compromised login information, malware netflow, malicious proxy session, compromised card information or phishing domains.
4. The system ofclaim 1, wherein the first results are aggregated and configured into a data format usable by the first entity.
5. The system ofclaim 1, wherein the first results are translated to a format based on a format suitable for a computing technology used by the first entity.
6. The system ofclaim 1, wherein the treat data includes indicators of financial compromise (IOFC) such that a single IOFC is utilized to create several threat models of the same or different threat model types.
7. The system ofclaim 6, wherein the IOFC comprises at least one of partial account information, compromised login information, malware netflow, malicious proxy sessions, compromised card information and phishing domains.
8. The system ofclaim 1, wherein the parameter threat model includes parameters associated with at least one of equality, inequality, full text, and partial text matches, wherein the parameters are used to identify a threat target associated with the first entity.
9. The system ofclaim 8, wherein the parameter threat model is collected from a parameter model interface to translate the parameter threat model into one or more identification queries based on computing technology or configuration used by the first entity's database implementation.
10. The system ofclaim 9, wherein the computing technology is associated with at least one of a database query language or a distributed search engine utilized by the first entity for managing data.
11. The system ofclaim 1, wherein the result data model includes at least one of the first entity's unique customer identifier, compromise timestamp, threat tag, attribution tag, provider tag, or feed tag from the result data.
12. A computer-implemented threat identification method, wherein at least one programmable processor is in communication with a non-transitory machine-readable medium for storing instructions that, when executed by the at least one programmable processor, cause the at least one programmable processor to perform one or more operations, the method comprising:
discovering threat data associated with a first entity;
translating the threat data to one or more threat models;
translating the one or more threat models, using a threat model parameter generator, to at least a parameter threat model;
translating the parameter threat model to one or more identification queries;
executing the one or more identification queries and translating generated results to result data in a first format; and
publishing one or more result data models from the result data in one or more formats or to one or more locations, the result data being aggregated and translated to a second format based on a format suitable for use by the first entity.
13. The system ofclaim 12, wherein the result data is translated to a second format based on a format suitable for a computing technology used by the first entity.
14. The system ofclaim 12, wherein the treat data includes indicators of financial compromise (IOFC).
15. The system ofclaim 14, wherein the IOFC is associated with at least one of partial account information, compromised login information, malware netflow, malicious proxy sessions, compromised card information and phishing domains.
16. A computer program product comprising a non-transitory machine-readable medium storing instructions that, when executed by at least one programmable processor, cause the at least one programmable processor to perform operations comprising:
discovering threat data associated with a first entity;
translating the threat data to one or more threat models;
translating the one or more threat models, using a threat model parameter generator, to at least a parameter threat model;
translating the parameter threat model to one or more identification queries;
executing the one or more identification queries and translating generated results to result data in a first format; and
publishing one or more result data models from the result data in one or more formats or to one or more locations.
17. The computer program product ofclaim 16, wherein the result data is aggregated and translated to a second format based on a format suitable for use by the first entity.
18. The computer program product ofclaim 16, wherein the result data is translated to a second format based on a format suitable for a computing technology used by the first entity.
19. The computer program product ofclaim 16, wherein the treat data includes indicators of financial compromise (IOFC).
20. The computer program product ofclaim 19, wherein the IOFC is associated with at least one of partial account information, compromised login information, malware netflow, malicious proxy sessions, compromised card information and phishing domains.
US17/836,9232019-07-032022-06-09Data breach prevention and remediationAbandonedUS20220300659A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/836,923US20220300659A1 (en)2019-07-032022-06-09Data breach prevention and remediation

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201962870332P2019-07-032019-07-03
US201962897197P2019-09-062019-09-06
US16/879,683US11392723B2 (en)2019-07-032020-05-20Data breach prevention and remediation
US17/836,923US20220300659A1 (en)2019-07-032022-06-09Data breach prevention and remediation

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/879,683ContinuationUS11392723B2 (en)2019-07-032020-05-20Data breach prevention and remediation

Publications (1)

Publication NumberPublication Date
US20220300659A1true US20220300659A1 (en)2022-09-22

Family

ID=74065758

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US16/879,683Active2041-02-16US11392723B2 (en)2019-07-032020-05-20Data breach prevention and remediation
US16/879,680AbandonedUS20210004492A1 (en)2019-07-032020-05-20Data breach prevention and remediation
US17/836,923AbandonedUS20220300659A1 (en)2019-07-032022-06-09Data breach prevention and remediation

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US16/879,683Active2041-02-16US11392723B2 (en)2019-07-032020-05-20Data breach prevention and remediation
US16/879,680AbandonedUS20210004492A1 (en)2019-07-032020-05-20Data breach prevention and remediation

Country Status (2)

CountryLink
US (3)US11392723B2 (en)
WO (2)WO2021002884A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11366892B2 (en)*2019-02-052022-06-21Shape Security, Inc.Detecting compromised credentials by improved private set intersection
US11223636B1 (en)*2019-12-232022-01-11NortonLifeLock Inc.Systems and methods for password breach monitoring and notification
US11483351B2 (en)2020-08-262022-10-25Cisco Technology, Inc.Securing network resources from known threats
US11880472B2 (en)*2021-01-142024-01-23Bank Of America CorporationGenerating and disseminating mock data for circumventing data security breaches
US11797686B1 (en)*2021-03-192023-10-24Citrix Systems, Inc.Assessing risk from use of variants of credentials
US12008112B2 (en)*2021-12-292024-06-11Zerofox, Inc.Systems and methods for unified cyber threat intelligence searching
US11843619B1 (en)*2022-10-072023-12-12Uab 360 ItStateless system to enable data breach notification
US20250063055A1 (en)*2023-08-152025-02-20Wells Fargo Bank, N.A.Quantum-based information protection
US20250307395A1 (en)*2024-03-292025-10-02Dell Products L.P.Malware detection techniques
US12299092B1 (en)*2024-07-112025-05-13Lookout, Inc.Compromised endpoint credentials interceptor

Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080148398A1 (en)*2006-10-312008-06-19Derek John MezackSystem and Method for Definition and Automated Analysis of Computer Security Threat Models
US20150128274A1 (en)*2013-11-042015-05-07Crypteia Networks S.A.System and method for identifying infected networks and systems from unknown attacks
US20160119365A1 (en)*2014-10-282016-04-28Comsec Consulting Ltd.System and method for a cyber intelligence hub
US20160366174A1 (en)*2015-04-172016-12-15Soltra Solutions, LlcComputerized system and method for securely distributing and exchanging cyber-threat information in a standardized format
US20170228658A1 (en)*2015-07-242017-08-10Certis Cisco Security Pte LtdSystem and Method for High Speed Threat Intelligence Management Using Unsupervised Machine Learning and Prioritization Algorithms
US20180255084A1 (en)*2017-03-022018-09-06Crypteia Networks S.A.Systems and methods for behavioral cluster-based network threat detection
US20190028498A1 (en)*2017-07-242019-01-24Sap SeThreat Modeling Tool Using Machine Learning
US20190149564A1 (en)*2017-11-102019-05-16Secureworks Corp.Systems and methods for secure propogation of statistical models within threat intelligence communities
US20190173923A1 (en)*2017-12-012019-06-06Massachusetts Institute Of TechnologySystems and methods for quantitative assessment of a computer defense technique
US20200067962A1 (en)*2018-08-242020-02-27California Institute Of TechnologyModel based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics
US20200204569A1 (en)*2018-12-192020-06-25Cisco Technology, Inc.Instant network threat detection system
US10885393B1 (en)*2017-09-282021-01-05Architecture Technology CorporationScalable incident-response and forensics toolkit
US10902114B1 (en)*2015-09-092021-01-26ThreatQuotient, Inc.Automated cybersecurity threat detection with aggregation and analysis
US10924503B1 (en)*2018-05-302021-02-16Amazon Technologies, Inc.Identifying false positives in malicious domain data using network traffic data logs
US20210064761A1 (en)*2018-01-222021-03-04Nec CorporationSecurity information processing device, information processing method, and recording medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8504456B2 (en)*2009-12-012013-08-06Bank Of America CorporationBehavioral baseline scoring and risk scoring
US20190394243A1 (en)*2012-09-282019-12-26Rex WiigSystem and method of a requirement, active compliance and resource management for cyber security application
US9640001B1 (en)2012-11-302017-05-02Microstrategy IncorporatedTime-varying representations of user credentials
US9490981B2 (en)*2014-06-022016-11-08Robert H. Thibadeau, SR.Antialiasing for picture passwords and other touch displays
US10114970B2 (en)*2015-06-022018-10-30ALTR Solutions, Inc.Immutable logging of access requests to distributed file systems
US10051001B1 (en)*2015-07-312018-08-14Palo Alto Networks, Inc.Efficient and secure user credential store for credentials enforcement using a firewall
US20170161733A1 (en)*2015-12-022017-06-08Mastercard International IncorporatedMethod and system for validation of a token requestor
US10277623B2 (en)*2016-03-182019-04-30AppBugs, INC.Method of detection of comptromised accounts
US9961053B2 (en)*2016-05-272018-05-01Dropbox, Inc.Detecting compromised credentials
US10129298B2 (en)*2016-06-302018-11-13Microsoft Technology Licensing, LlcDetecting attacks using compromised credentials via internal network monitoring
US20180173891A1 (en)*2016-12-212018-06-21AppBugs, INC.Provision of risk information associated with compromised accounts
US20200007343A1 (en)*2018-06-282020-01-02Blockchain Integrated Partners, LlcSystems and methods for data validation and assurance
US10554637B1 (en)*2019-05-012020-02-04Cyberark Software Ltd.Secure and reconstructible distribution of data among network resources

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080148398A1 (en)*2006-10-312008-06-19Derek John MezackSystem and Method for Definition and Automated Analysis of Computer Security Threat Models
US20150128274A1 (en)*2013-11-042015-05-07Crypteia Networks S.A.System and method for identifying infected networks and systems from unknown attacks
US20160119365A1 (en)*2014-10-282016-04-28Comsec Consulting Ltd.System and method for a cyber intelligence hub
US20160366174A1 (en)*2015-04-172016-12-15Soltra Solutions, LlcComputerized system and method for securely distributing and exchanging cyber-threat information in a standardized format
US20170228658A1 (en)*2015-07-242017-08-10Certis Cisco Security Pte LtdSystem and Method for High Speed Threat Intelligence Management Using Unsupervised Machine Learning and Prioritization Algorithms
US10902114B1 (en)*2015-09-092021-01-26ThreatQuotient, Inc.Automated cybersecurity threat detection with aggregation and analysis
US20180255084A1 (en)*2017-03-022018-09-06Crypteia Networks S.A.Systems and methods for behavioral cluster-based network threat detection
US20190028498A1 (en)*2017-07-242019-01-24Sap SeThreat Modeling Tool Using Machine Learning
US10885393B1 (en)*2017-09-282021-01-05Architecture Technology CorporationScalable incident-response and forensics toolkit
US20190149564A1 (en)*2017-11-102019-05-16Secureworks Corp.Systems and methods for secure propogation of statistical models within threat intelligence communities
US20190173923A1 (en)*2017-12-012019-06-06Massachusetts Institute Of TechnologySystems and methods for quantitative assessment of a computer defense technique
US20210064761A1 (en)*2018-01-222021-03-04Nec CorporationSecurity information processing device, information processing method, and recording medium
US10924503B1 (en)*2018-05-302021-02-16Amazon Technologies, Inc.Identifying false positives in malicious domain data using network traffic data logs
US20200067962A1 (en)*2018-08-242020-02-27California Institute Of TechnologyModel based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics
US20200204569A1 (en)*2018-12-192020-06-25Cisco Technology, Inc.Instant network threat detection system

Also Published As

Publication numberPublication date
US11392723B2 (en)2022-07-19
WO2021002884A1 (en)2021-01-07
WO2021002885A1 (en)2021-01-07
US20210006573A1 (en)2021-01-07
US20210004492A1 (en)2021-01-07

Similar Documents

PublicationPublication DateTitle
US11392723B2 (en)Data breach prevention and remediation
US12380245B1 (en)Third-party platform for tokenization and detokenization of network packet data
US20240031397A1 (en)Selecting actions responsive to computing environment incidents based on severity rating
US11831785B2 (en)Systems and methods for digital certificate security
US11700283B2 (en)System and method for self-adjusting cybersecurity analysis and score generation
US10193909B2 (en)Using instrumentation code to detect bots or malware
KR102130122B1 (en) Systems and methods for detecting online fraud
EP3190765B1 (en)Sensitive information processing method, device, server and security determination system
US10205742B2 (en)Stateless web content anti-automation
US11968239B2 (en)System and method for detection and mitigation of data source compromises in adversarial information environments
US8856928B1 (en)Protecting electronic assets using false profiles in social networks
US10887261B2 (en)Dynamic attachment delivery in emails for advanced malicious content filtering
US20060272008A1 (en)Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
US20210182416A1 (en)Method and system for secure access to metrics of time series data
CN112104625A (en)Process access control method and device
US11128645B2 (en)Method and system for detecting fraudulent access to web resource
US20210182417A1 (en)Method and system for secure ingestion of metrics of time series data
CN119918037A (en) Terminal operating environment security authentication method and system

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:CYBER TEAM SIX, NORTH CAROLINA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRITT, JASON;WESTERHAUS, PATRICK A.;SIGNING DATES FROM 20200615 TO 20200616;REEL/FRAME:063914/0231

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp