Geographical intrusion mapping system using telecommunication billing and inventory systems
First Claim
Patent Images
1. A method for geographically mapping a threat, comprising:
- receiving threat data;
receiving identification data;
receiving location data;
correlating the threat data and the identification data with the location data to generate map data; and
generating a map displaying a geographical location of the threat based on the map data.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for geographically mapping a threat into a network having one or more network points include receiving threat information identifying a threat to a point of the network, correlating the threat information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the threat.
108 Citations
25 Claims
-
1. A method for geographically mapping a threat, comprising:
-
receiving threat data;
receiving identification data;
receiving location data;
correlating the threat data and the identification data with the location data to generate map data; and
generating a map displaying a geographical location of the threat based on the map data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for geographically mapping a threat, comprising:
-
receiving threat data;
querying identification data by providing the threat data;
receiving the identification data;
querying location data by providing the identification data;
receiving the location data;
correlating the threat data with the location data to generate map data; and
generating a map displaying a geographical location of the threat based on the map data. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system for geographically mapping a threat, comprising:
-
a network security system configured to provide threat data;
an identification system configured to provide identification data;
a location system configured to provide location data; and
a mapping system connected to the network security system, identification system and location system, and configured to receive the threat data, the identification data and the location data, generate map data by correlating the threat data and the identification data with the location data, and generate a map reflecting a geographical location of the threat based on the map data; and
a display device connected to the mapping system and configured to communicate with the mapping system to display the generated map. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for geographically mapping a threat, comprising:
-
a network security system configured to provide threat data;
an identification system configured to receive the threat data from the network security system and provide identification data based on the threat data;
a location system configured to receive the identification data from the identification system and provide location data based on the identification data;
a mapping system configured to receive the threat data and the location data, generate map data by correlating the threat data with the location data, and generate a map reflecting a geographical location of the threat based on the map data; and
a display device configured to communicate with the mapping system to display the generated map. - View Dependent Claims (22, 23, 24, 25)
-
Specification