×

Protecting threat indicators from third party abuse

  • US 10,367,829 B2
  • Filed: 11/19/2015
  • Issued: 07/30/2019
  • Est. Priority Date: 11/19/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-based method for detecting threats based on obfuscated threat indicators, the method comprising:

  • receiving, from a server, an obfuscated threat indicator associated with an identified cyber-threat that was determined by the server to be above a threshold level of quality, the obfuscated threat indicator having been generated by the server responsive to determining that the identified-cyber-threat is above the threshold level of quality by;

    including a threat data source of a threat indicator and excluding raw information of the threat indicator;

    identifying one or more client-side events occurring within a third-party system, each client-side event identified by an entity identifier indicating an entity to which the client-side event is attributed;

    determining that the third-party system experienced a cyber-threat when the obfuscated threat indicator matches at least one entity identifier; and

    in response to determining that the third-party system experienced the cyber-threat;

    generating descriptive information associated with the obfuscated threat indicator; and

    transmitting the descriptive information to the third-party system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×