Security via adaptive threat modeling
First Claim
Patent Images
1. A computing device comprising:
- a processor;
a network interface coupled to the processor;
a storage device coupled to the processor; and
a security application stored in the storage device, wherein execution of the security application by the processor configures the computing device to perform acts comprising;
receiving behavioral data of a user, for a predetermined period;
analyzing the behavioral data for a pattern of online behavior of the user with one or more user equipment identified to be used by the user;
creating a susceptibility profile of the user based on the pattern of online behavior of the user with the one or more user equipment;
receiving one or more environment parameters;
creating an adaptive security threat model tailored for the user based on the susceptibility profile of the user and the one or more environment parameters;
iteratively, until the adaptive security threat model exceeds a first predetermined threshold;
monitoring the behavioral data;
adjusting the susceptibility profile of the user based on the monitoring of the behavioral data; and
adjusting the adaptive security threat model in accordance with the monitoring of the behavioral data;
in response to the adaptive security threat model exceeding the first predetermined threshold, creating an adaptive security solution tailored for the user equipment based on the adaptive security threat model; and
sending a report data packet that includes the adaptive security solution via the network interface to an account of the user.
3 Assignments
0 Petitions
Accused Products
Abstract
A methods and systems of providing security based on an identified susceptibility profile of a user are provided. Behavioral data related to an account of a user is received for a predetermined period. The behavioral data is analyzed for a pattern of on-line behavior of the user. A susceptibility profile of the user is created based on the pattern of on-line behavior. Environment parameters are received from a database. A security threat model is created based on the susceptibility profile and the environment parameters. A report data packet based on the created threat model is sent to an account of the user.
-
Citations
20 Claims
-
1. A computing device comprising:
-
a processor; a network interface coupled to the processor; a storage device coupled to the processor; and a security application stored in the storage device, wherein execution of the security application by the processor configures the computing device to perform acts comprising; receiving behavioral data of a user, for a predetermined period; analyzing the behavioral data for a pattern of online behavior of the user with one or more user equipment identified to be used by the user; creating a susceptibility profile of the user based on the pattern of online behavior of the user with the one or more user equipment; receiving one or more environment parameters; creating an adaptive security threat model tailored for the user based on the susceptibility profile of the user and the one or more environment parameters; iteratively, until the adaptive security threat model exceeds a first predetermined threshold; monitoring the behavioral data; adjusting the susceptibility profile of the user based on the monitoring of the behavioral data; and adjusting the adaptive security threat model in accordance with the monitoring of the behavioral data; in response to the adaptive security threat model exceeding the first predetermined threshold, creating an adaptive security solution tailored for the user equipment based on the adaptive security threat model; and sending a report data packet that includes the adaptive security solution via the network interface to an account of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium having stored thereon a plurality of sequences of instructions which, when executed by the processor, cause the processor to perform a method of providing security, the method comprising:
-
receiving behavioral data of a user, for a predetermined period; analyzing the behavioral data for a pattern of online behavior of the user with one or more user equipment identified to be used by the user; creating a susceptibility profile of the user based on the pattern of online behavior of the user with the one or more user equipment; creating an adaptive security threat model tailored for the user based on the susceptibility profile of the user; iteratively, until the adaptive security threat model exceeds a first predetermined threshold; monitoring the behavioral data; adjusting the susceptibility profile of the user based on the monitoring of the behavioral data; and adjusting the adaptive security threat model in accordance with the monitoring of the behavioral data; in response to the adaptive security threat model exceeding the first predetermined threshold, creating an adaptive security solution tailored for the user equipment based on the adaptive security threat model; sending the adaptive security threat model to a policy database; receiving a policy from the policy database based on the adaptive security threat model; and sending a report data packet that includes the adaptive security solution based on the policy to an account of the user. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification