×

Threat intelligence system and method

  • US 10,397,267 B2
  • Filed: 07/05/2016
  • Issued: 08/27/2019
  • Est. Priority Date: 07/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, executed on a computing device, comprising:

  • importing threat data from a plurality of threat data sources, thus generating a plurality of raw threat data definitions, wherein the plurality of threat data sources includes social network trader sources, wherein importing threat data from a plurality of threat data sources includes defining a list of specific keywords and searching the social network trader sources for the specific keywords, wherein the list of keywords concern one or more of a specific type of attack, a specific company/organization targeted for an attack, and a specific known hacker;

    processing the plurality of raw threat data definitions, thus generating a plurality of processed threat data definitions, wherein the plurality of raw threat data definitions include a plurality of data pieces with one or more of an age level and a trust level;

    processing the plurality of processed threat data definitions to form a master threat data definition; and

    providing the master threat data definition to one or more client electronic devices to enable the one or more client electronic devices to detect one or more threats, wherein providing the master threat data definition to one or more client electronic devices includes automatically providing at least a portion of the master threat data definition to the one or more client electronic devices using an Extract, Transform, Load (ETL) script.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×