Geographical Threat Response Prioritization Mapping System And Methods Of Use
First Claim
Patent Images
1. A method comprising:
- receiving threat data comprising at least a description and time of occurrence of a threat and at least one or more of a network address associated with the threat;
determining location data associated with the network address, wherein determining location data comprises determining either wireless location data or a physical location associated with the network address;
correlating the threat data with the location data to generate map data; and
generating a map displaying a geographical location of the threat based on the map data.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for mapping threats (or vulnerabilities to attacks) based on a correlation of location data, such as wireless location data or a physical location, with an network address associated with a threat are provided. In one aspect, methods and systems include receiving threat data, retrieving location data, correlating the threat data with the location data to create map data, and generating a map, based on the map data, displaying a geographical location of the threat. Threat locations may be determined for wired and wireless telecommunications systems.
-
Citations
25 Claims
-
1. A method comprising:
-
receiving threat data comprising at least a description and time of occurrence of a threat and at least one or more of a network address associated with the threat;
determining location data associated with the network address, wherein determining location data comprises determining either wireless location data or a physical location associated with the network address;
correlating the threat data with the location data to generate map data; and
generating a map displaying a geographical location of the threat based on the map data. - View Dependent Claims (2)
-
-
3. A method comprising:
-
receiving threat information about a threat, wherein said threat information comprises a description of the threat and at least one telephone number;
correlating the threat information with location information to determine at least one physical location associated with the threat; and
generating a map displaying a geographical location of the at least one physical location associated with the threat. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving fraud information about a fraud event, wherein said fraud information comprises a description of the fraud event and at least one telephone number;
receiving intrusion information identifying a point in a network at which an intrusion has occurred;
correlating the intrusion information with wireless location data for the identified network point;
correlating the fraud information with location information to determine at least one physical location associated with the fraud event; and
generating a map displaying in layers a geographical location of the at least one physical location associated with the fraud event and a geographical location of the identified network point based upon the wireless location data. - View Dependent Claims (11, 12, 13)
-
-
14. A system comprised of:
-
a threat detection system configured to electronically review call detail records and identify suspected threats by creating threat information;
a location engine configured to receive said threat information from said threat detection system and correlate said threat information with one or more physical locations; and
an electronic mapping system configured to receive at least said one or more physical locations from said location engine and map said one or more physical locations on an electronic map that is displayed on a display device. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system comprised of:
-
a fraud database comprised of fraud information associated with one or more fraud events;
an intrusion database comprised of intrusion information associated with one or more intrusion points in a network;
a location engine configured to retrieve said fraud information from said fraud database and said intrusion information from said intrusion database and correlate said fraud information and said intrusion information with one or more physical locations;
a mapping database configured to receive at least said one or more physical locations from said location engine to form mapping information; and
an electronic mapping system map that is configured to retrieve said mapping information from said mapping database and display said one or more physical locations of said fraud events and intrusion points on an electronic map that is displayed on a display device. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification