Dynamic Threat Analysis Engine for Mobile Users
First Claim
1. A system comprises:
- a computing system, comprising one or more processors, memory and a computer readable hardware storage device storing a computer program product for detecting conditions at geographic locations, the computer program product comprising instructions to configure the computing system to;
receive a plural information feeds;
aggregate the information according commonality of information;
analyze information from the plural information feeds according to rules, upon detection of a rule being triggered for a particular user,produce an instruction thread that filters the received information from the data feeds according to the triggered rule;
produce an instruction thread that continually analyzes the filtered information from the data feeds to produce operational decisions based on the information and data feeds; and
detect during the continual analysis changes in risk of a threat according to the triggered rule.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for detecting conditions at a geographic location are described. The techniques receive plural information feeds, aggregate the information according commonality of information, and analyze information from the plural information feeds according to rules. Upon detection of a rule being triggered for a particular user, the techniques produce or spawn an instruction thread that is controlled or scheduled by an instruction thread scheduler and which filters the received information from the data feeds according to the triggered rule, (and user, user location) and produce an instruction thread that continually analyzes the filtered information from the data feeds to produce operational decisions based on the information and data feeds, detect during the continual analysis changes in risk of a threat according to the triggered rule, produce response messages based on the determined change, and send the generated response messages as an alert to a system/device of a user.
35 Citations
16 Claims
-
1. A system comprises:
-
a computing system, comprising one or more processors, memory and a computer readable hardware storage device storing a computer program product for detecting conditions at geographic locations, the computer program product comprising instructions to configure the computing system to; receive a plural information feeds; aggregate the information according commonality of information; analyze information from the plural information feeds according to rules, upon detection of a rule being triggered for a particular user, produce an instruction thread that filters the received information from the data feeds according to the triggered rule; produce an instruction thread that continually analyzes the filtered information from the data feeds to produce operational decisions based on the information and data feeds; and detect during the continual analysis changes in risk of a threat according to the triggered rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product tangibly stored on a computer readable hardware storage device, the computer program product for detecting conditions at a geographic location, the computer program product comprising instructions to cause a processor to:
-
receive a plural information feeds; aggregate the information feeds according commonality of information; analyze information from the plural information feeds according to rules, upon detection of a rule being triggered for a particular user, produce an instruction thread that filters the received information from the data feeds according to the triggered rule; produce an instruction thread that continually analyzes the filtered information from the data feeds to produce operational decisions based on the information and data feeds; detect during the continual analysis changes in risk of a threat according to the triggered rule; produce response messages based on the determined change; and send the generated response messages as an alert to a system/device of a user. - View Dependent Claims (12, 13, 14)
-
-
15. A method comprises:
-
receiving by one or more computing systems a plural information feeds; aggregating by the computing system the information according commonality of information; analyzing by the one or more computing systems the information from the plural information feeds according to rules, upon detection of a rule being triggered for a particular user, producing by the one or more computing systems an instruction thread that filters the received information from the data feeds according to the triggered rule; producing by the one or more computing systems an instruction thread that continually analyzes the filtered information from the data feeds to produce operational decisions based on the information and data feeds; and detecting by the one or more computing systems during the continual analysis changes in risk of a threat according to the triggered rule. - View Dependent Claims (16)
-
Specification