System and method for deterring rogue users from attacking protected legitimate users
First Claim
1. A method of deterring rogue cyber activity against protected legitimate users (PLUs), the method comprising:
- sending a warning to a rogue user (RU) determined to have targeted or attacked a PLU with rogue cyber activity;
detecting the RU has ignored the warning; and
deploying an active deterrence mechanism to thereby deter the RU from engaging in subsequent rogue cyber activity against the PLU.
2 Assignments
0 Petitions
Accused Products
Abstract
An active deterrence method and system deter rogue cyber activity targeting one or more protected legitimate users (PLUs). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings to one or more rogue users (RUs) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
-
Citations
58 Claims
-
1. A method of deterring rogue cyber activity against protected legitimate users (PLUs), the method comprising:
-
sending a warning to a rogue user (RU) determined to have targeted or attacked a PLU with rogue cyber activity;
detecting the RU has ignored the warning; and
deploying an active deterrence mechanism to thereby deter the RU from engaging in subsequent rogue cyber activity against the PLU. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A method of securing protected legitimate users (PLUs) from rogue cyber activity, the method comprising:
-
providing a subscription or a service agreement to a PLU;
detecting rogue cyber activity aimed at the PLU; and
deploying an active deterrence mechanism to thereby secure the PLU from subsequent rogue cyber activity from a rogue user (RU) responsible for the detected rogue cyber activity. - View Dependent Claims (46, 47, 48, 49, 50)
-
-
51. A method of servicing protected legitimate users (PLUs) subjected to rogue cyber activity, the method comprising:
-
detecting a rogue user (RU) having targeted or attacked a PLU with rogue cyber activity;
analyzing the rogue cyber activity to identify a product or a service being promoted; and
selling advertisement space to a reputable company offering the identified product or service. - View Dependent Claims (52)
-
-
53. A method for reducing harmful effects or maintenance costs of a currently used defensive measure against rogue cyber activity without reducing overall protection against rogue cyber activity, the method comprising:
-
deterring a rogue cyber activity targeting a protected legitimate user (PLU);
deploying an active deterrence mechanism to thereby secure the PLU from subsequent rogue cyber activity; and
instructing the PLU to set a sensitivity level of the currently used defensive measure to a lower level, wherein upon execution of said instructing, the harmful effects or maintenance costs of the currently used defensive measure are reduced.
-
-
54. A method for lowering costs associated with offering a deterrence service, the method comprising:
-
offering a potential consumer an option to become a protected legitimate users (PLU) for free in exchange for the PLU'"'"'s providing a portion of the computing resources of the PLU available to a distributed deterrence platform;
detecting rogue cyber activity aimed at the PLU; and
deploying an active deterrence mechanism over the distribute deterrence platform to thereby secure the PLU from subsequent rogue cyber activity.
-
-
55. A method for creating effective registries or identifying marks for a potential protected legitimate user (PLU) before having a PLU as a customer, the method comprising:
-
creating a plurality of artificial PLUs;
deriving an artificial communication descriptor or an artificial identifying mark for each of the plurality of artificial PLUs, to thereby produce a plurality of artificial communication descriptors and/or a plurality of artificial identifying marks;
populating a PLU registry with the artificial communication descriptors;
providing the PLU registry or the plurality of artificial identifying marks to a rogue user (RU);
sending a warning to the RU to discourage communications with any member of the PLU registry or any member displaying any of the plurality of artificial identifying marks;
detecting the RU has ignored the warning; and
deploying an active deterrence mechanism when the RU is detected to have ignored the warning.
-
-
56. A method for protecting data entries published to one or more hostile parties, the method comprising:
-
accessing a list of data entries;
converting the data entries to a hashed format, wherein said converting includes limiting a number of bits in the hashed format to cause a predetermined quantity of collisions and produce a predefined probability of false matches; and
providing the data entries in the hashed format to the one or more hostile parties. - View Dependent Claims (57, 58)
-
Specification