SYSTEMS AND METHODS FOR AUTOMATED RETRIEVAL, PROCESSING, AND DISTRIBUTION OF CYBER-THREAT INFORMATION
First Claim
1. A method for automated retrieval, processing, and distribution of cyber-threat information from a plurality of sources using a network device, comprising:
- receiving cyber-threat information in one or more first formats from at least one internal source of cyber-threat information using an accessing component of the network device;
receiving cyber-threat information in one or more second formats from at least one external source of cyber-threat information using the accessing component of the network device;
processing the received cyber-threat information in the one or more first formats and the one or more second formats into a standard format using a processing component of the network device, wherein the standard format comprises at least one data marking that indicates a categorization of the received cyber-threat information in the one or more first formats and the one or more second formats;
providing the processed cyber-threat information to a distributor using a distributing component of the network device; and
automatically reporting information concerning the processed cyber-threat information to a user device using a reporting component of the network device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for automated retrieval, processing, and/or distribution of cyber-threat information using a cyber-threat device. Consistent with disclosed embodiments, the cyber-threat device may receive cyber-threat information in first formats from internal sources of cyber-threat information using an accessing component of the cyber-threat device. The cyber-threat device may receive cyber-threat information second formats from external sources of cyber-threat information using an accessing component of the cyber-threat device. The cyber-threat device may process the received cyber-threat information in the first formats and the second formats into a standard format using a processing component of the cyber-threat device. The cyber-threat device may provide the processed items of cyber-threat information to a distributor using a distributing component of the cyber-threat device. The cyber-threat device may automatically report information concerning the processed items of cyber-threat information to a device of a user with a reporting component of the cyber-threat device.
-
Citations
26 Claims
-
1. A method for automated retrieval, processing, and distribution of cyber-threat information from a plurality of sources using a network device, comprising:
-
receiving cyber-threat information in one or more first formats from at least one internal source of cyber-threat information using an accessing component of the network device; receiving cyber-threat information in one or more second formats from at least one external source of cyber-threat information using the accessing component of the network device; processing the received cyber-threat information in the one or more first formats and the one or more second formats into a standard format using a processing component of the network device, wherein the standard format comprises at least one data marking that indicates a categorization of the received cyber-threat information in the one or more first formats and the one or more second formats; providing the processed cyber-threat information to a distributor using a distributing component of the network device; and automatically reporting information concerning the processed cyber-threat information to a user device using a reporting component of the network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification