System, Method, and Computer Program Product for Isolating a Device Associated with At Least Potential Data Leakage Activity, Based on User Input
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving, by a first computer system, a first notification from a third computer indicating the third computer detected a potential data leakage activity on a second computer;
generating a user prompt on the first computer system in response to receiving the first notification from the third computer, wherein the user prompt comprises a plurality of choices for isolating the second computer, wherein at least one of the plurality of choices is received from the third computer in the first notification;
receiving a user input after generating the user prompt, the user input indicating a selection of one of the choices; and
attempting to isolate the second computer based on the selected choice.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential data leakage activity associated with a device is identified. Furthermore, at least one action is performed to isolate the device, based on user input received utilizing a user interface.
10 Citations
21 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a first computer system, a first notification from a third computer indicating the third computer detected a potential data leakage activity on a second computer; generating a user prompt on the first computer system in response to receiving the first notification from the third computer, wherein the user prompt comprises a plurality of choices for isolating the second computer, wherein at least one of the plurality of choices is received from the third computer in the first notification; receiving a user input after generating the user prompt, the user input indicating a selection of one of the choices; and attempting to isolate the second computer based on the selected choice. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory machine readable medium, on which are stored instructions, comprising instructions that when executed cause one or more programmable devices to:
-
receive, by a first computer system, a first notification from a third computer indicating the third computer detected a potential data leakage activity on a second computer; generate a user prompt on the first computer system in response to receiving the first notification from the third computer, wherein the user prompt comprises a plurality of choices for isolating the second computer, wherein at least one of the plurality of choices is received from the third computer in the first notification; receive a user input after generating the user prompt, the user input indicating a selection of one of the choices; and attempt to isolate the second computer based on the selected choice. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
one or more processors; and a memory, coupled to the one or more processors, on which instructions are stored comprising instructions which, when executed by the one or more processors cause the one or more processors to; receive a first notification from a first computer indicating the first computer detected a potential data leakage activity on a second computer; generate a user prompt in response to receiving the first notification from the first computer, wherein the user prompt comprises a plurality of choices for isolating the second computer, wherein at least one of the plurality of choices is received from the first computer in the first notification; receive a user input after generating the user prompt, the user input indicating a selection of one of the choices; and attempt to isolate the second computer based on the selected choice. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification