×

SECURITY THREAT INFORMATION ANALYSIS

  • US 20160261640A1
  • Filed: 05/16/2016
  • Published: 09/08/2016
  • Est. Priority Date: 08/29/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • determining, by one or more computers in an analysis system, one or more intelligence types;

    categorizing, by at least one of the computers and for each dataset from multiple datasets that each include information about potential security threats, each subset of data for the respective dataset, the categorizing comprising;

    identifying, by at least one of the computers and for each of the subsets of data in the respective dataset, an intelligence type that categorizes the subset of data; and

    associating, by at least one of the computers and for each of the subsets of data in the respective dataset, the subset of data with the corresponding intelligence type;

    determining, by at least one of the computers and for each of the categorized subsets, whether the respective subset does not comprise information about the same threat as a different subset;

    determining, by at least one of the computers, that a first subset from the categorized subsets does not comprise information about the same threat as a second different subset in response to determining whether the respective subset does not comprise information about the same threat as a different subset;

    determining, by at least one of the computers, that a third subset from the categorized subsets comprises information about the same threat as a fourth different subset in response to determining whether the respective subset does not comprise information about the same threat as a different subset;

    determining, by at least one of the computers, a group of the subsets that include particular data a third party system should receive from the analysis system, including;

    determining, for a first third party system, a first group includes the first subset; and

    determining, for a second third party system, a second group that includes the third subset and does not include the fourth subset;

    assigning, by at least one of the computers and for each subset in each of the groups, a priority to the respective subset; and

    sending, by at least one of the computers and to a third party system, the subsets in the group of the subsets using the respective priorities including;

    sending, to the first third party system, the subsets in the first group, including the first subset, using the respective priorities; and

    sending, to the second third party system, the subsets in the second group, including the third subset, using the respective priorities.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×