Skeptical system
First Claim
Patent Images
1. A computer-implemented skeptical method comprising:
- monitoring commands of a user entered into a computer;
predicting a plan of the user based on the monitored commands;
assessing a threat based on the predicted plan;
selecting, from among a plurality of possible responses, a response that is appropriate to the assessed threat; and
executing the selected response to store the assessed threat.
2 Assignments
0 Petitions
Accused Products
Abstract
A skeptical system protects an asset by monitoring commands of a user, predicting a plan of the user based on the monitored commands, inferring an actual plan from the predicted plan, receiving information related to an identity of the user, inferring an actual identity of the user from the information, assessing a threat based on the actual plan and the actual user identity, and selecting, from among a plurality of possible responses, a response that is appropriate to the assessed threat.
-
Citations
36 Claims
-
1. A computer-implemented skeptical method comprising:
-
monitoring commands of a user entered into a computer; predicting a plan of the user based on the monitored commands; assessing a threat based on the predicted plan; selecting, from among a plurality of possible responses, a response that is appropriate to the assessed threat; and executing the selected response to store the assessed threat. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer-implemented skeptical method comprising:
-
monitoring commands of a user entered into a computer; matching the commands to plans stored in a plan library; predicting a plan of the user from the matching plans; receiving information related to an identity of the user; assessing a threat assessment from a memory based on the predicted plan and the user identification information; selecting, from among a plurality of possible responses, a response that is appropriate to the assessed threat assessment; and executing the selected response to store the assessed threat. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification