×

Hierarchical risk assessment and remediation of threats in mobile networking environment

  • US 10,686,819 B2
  • Filed: 10/22/2013
  • Issued: 06/16/2020
  • Est. Priority Date: 02/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • collecting or detecting vulnerability data from distributed sources, the vulnerability data including;

    a first vulnerability data set from aspects of a mobile device, the mobile device being a first source of the distributed sources,a second vulnerability data set from communication between the mobile device and a server in a secure network, the server being a second source of the distributed sources, anda third set vulnerability data set from communication between the mobile device and a network service, the network service being a third source of the distributed sources, the collecting or detecting performed by a facility having a processor, a non-transitory computer-readable medium, and stored instructions translatable by the processor, the facility configured for enhancing security of mobile devices in a mobile networking environment;

    centrally processing the vulnerability data in order of threat priority associated therewith, the processing performed by the facility, the processing comprising;

    for each vulnerability event in the vulnerability data;

    determining, from a plurality of vulnerability policies, a matching vulnerability policy that matches a respective vulnerability event in the vulnerability data and that contains a risk score;

    extracting the risk score from the matching vulnerability policy;

    based at least on the risk score extracted from the matching vulnerability policy, determining a best matching risk remediation policy for the respective vulnerability event in the vulnerability data; and

    performing a remediation for the mobile device per the best matching risk remediation policy to remediate the respective vulnerability event in the vulnerability data; and

    reporting, through a user interface of the facility, vulnerability events in the vulnerability data and associated remediations for the mobile device in the order of the threat priority.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×