×

Proactive intrusion protection system

  • US 10,447,722 B2
  • Filed: 11/24/2015
  • Issued: 10/15/2019
  • Est. Priority Date: 11/24/2015
  • Status: Active Grant
First Claim
Patent Images

1. One or more non-transitory computer-readable media comprising logic corresponding to an application associated with a remote device and a remote system, the logic when executed by one or more processors is operable to perform operations comprising:

  • receiving, from the remote system, data identifying a plurality of compromising entities, where the data comprises at least one device identifier and intrusion tactics;

    identifying an incoming communication within a network initiated by the remote device;

    identifying information regarding the incoming communication, where the information comprises;

    information regarding a source of the incoming communication,a MAC address for the source of the incoming communication, andbehavior characteristics of a sender for the incoming communication;

    determining an entity associated with the source of the incoming communication by analyzing the information regarding the incoming communication;

    determining that the entity associated with the source of the incoming communication matches at least one of the plurality of compromising entities based, at least in part, on comparing the data identifying the plurality of compromising entities to the entity associated with the source of the incoming communication;

    comparing the behavior characteristics to the stored intrusion tactics in response to determining that the entity associated with the source of the incoming communication matches at least one of the plurality of compromising entities;

    determining that the behavior characteristics match, at least in part, the stored intrusion tactics;

    generating a signal configured to block the incoming communication in response to determining that the behavior characteristics match, at least in part, the stored intrusion tactics; and

    tracking the source of the incoming communication based on the MAC address of the source of the incoming communication in response to generating the signal for blocking the incoming communication, wherein tracking the source of the incoming communication removes the ability for the source of the incoming communication to access the network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×