Geographical threat response prioritization mapping system and methods of use
First Claim
Patent Images
1. A processor-implemented method, comprising:
- receiving threat data comprising at least a description and time of occurrence of a threat and at least one or more of a network address associated with the threat;
receiving threat response data associated with the received threat data;
determining via a processor location data associated with the network address, wherein determining location data includes determining wireless call location data associated with the network address;
correlating via the processor the threat data with the location data to generate map data;
dynamically updating the generated map data with the received threat response data; and
generating a map displaying a geographical location of the threat and associated threat response based on the dynamically updated map data.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for mapping threats (or vulnerabilities to attacks) based on a correlation of location data, such as wireless location data or a physical location, with an network address associated with a threat are provided. In one aspect, methods and systems include receiving threat data, retrieving location data, correlating the threat data with the location data to create map data, and generating a map, based on the map data, displaying a geographical location of the threat. Threat locations may be determined for wired and wireless telecommunications systems.
-
Citations
25 Claims
-
1. A processor-implemented method, comprising:
-
receiving threat data comprising at least a description and time of occurrence of a threat and at least one or more of a network address associated with the threat; receiving threat response data associated with the received threat data; determining via a processor location data associated with the network address, wherein determining location data includes determining wireless call location data associated with the network address; correlating via the processor the threat data with the location data to generate map data; dynamically updating the generated map data with the received threat response data; and generating a map displaying a geographical location of the threat and associated threat response based on the dynamically updated map data. - View Dependent Claims (2)
-
-
3. A processor-implemented method, comprising:
-
receiving threat information about a threat, wherein said threat information comprises a description of the threat and at least one telephone number; receiving threat response information associated with the threat; correlating via a processor the threat information with wireless call location information to determine at least one physical location associated with the threat; dynamically updating the correlated threat information with the received threat response information; and generating a map displaying a geographical location of the at least one physical location associated with the threat and associated threat response based on the dynamically updated threat information. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A processor-implemented method, comprising:
-
receiving fraud information about a fraud event, wherein said fraud information comprises a description of the fraud event and at least one telephone number; receiving intrusion information identifying a point in a network at which an intrusion has occurred; receiving intrusion response information associated with the intrusion; correlating via a processor the intrusion information with wireless call location data for the identified network point; correlating via the processor the fraud information with location information to determine at least one physical location associated with the fraud event; dynamically updating the correlated intrusion information with the received intrusion response information; and generating a map displaying in layers a geographical location of the at least one physical location associated with the fraud event, and a geographical location of the identified network point based upon the wireless call location data and associated intrusion response based on the dynamically updated intrusion information. - View Dependent Claims (11, 12, 13)
-
-
14. A system comprised of:
-
a threat detection system configured to; electronically review call detail records and identify suspected threats by creating threat information; a location engine configured to; receive said threat information from said threat detection system; receive threat response information associated with the received threat information; correlate said threat information with one or more physical locations based on wireless call location data derived from the threat information; dynamically update the correlated threat information with the received threat response information; and an electronic mapping system configured to; receive at least said one or more physical locations from said location engine; map said one or more physical locations on an electronic map; and display the electronic map showing said one or more physical locations and associated threat response based on the dynamically updated threat information on a display device. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system comprised of:
-
a fraud database comprised of fraud information associated with one or more fraud events; an intrusion database comprised of intrusion information associated with one or more intrusion points in a network; a location engine configured to; retrieve said fraud information from said fraud database and said intrusion information from said intrusion database; retrieve intrusion response information associated with the received intrusion information; correlate said fraud information and said intrusion information with one or more physical locations based on wireless call location data associated with said fraud information and said intrusion information; a mapping database configured to; receive at least said one or more physical locations from said location engine to form mapping information; dynamically update the mapping information with the retrieved intrusion response information; and an electronic mapping system map that is configured to retrieve said dynamically updated mapping information from said mapping database and display said one or more physical locations of said fraud events, intrusion points and associated intrusion response on an electronic map that is displayed on a display device. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification