×

Layered graphical event mapping

  • US 9,008,617 B2
  • Filed: 12/28/2006
  • Issued: 04/14/2015
  • Est. Priority Date: 12/28/2006
  • Status: Active Grant
First Claim
Patent Images

1. A processor-implemented method, comprising:

  • receiving fraud information about a plurality of fraud events that were facilitated by a network, the fraud information including, for each of the fraud events, a network address identifying a network point that facilitated the respective fraud event;

    receiving network intrusion information about a plurality of intrusion events occurring in the network, where each intrusion event comprises an unauthorized attempt to enter or use a system of the network via a network point, and the network intrusion information includes, for each of the plurality of intrusion events, a network address of the network point associated with the respective intrusion event;

    receiving physical crime information associated with a plurality of physical crimes, wherein the physical crime information includes geographical locations that are associated with the plurality of physical crimes, and a description of each of the plurality of physical crimes;

    automatically correlating via a processor the network addresses of the network intrusion information and the network addresses of the fraud information with location information for the network points of the network to determine physical locations associated with the plurality of fraud events and physical locations associated with the plurality of intrusion events;

    generating via the processor a map of subject specific overlays displaying in layers;

    a fraud events overlay of geographical locations of the physical locations associated with the plurality of fraud events, an intrusion events overlay of geographical locations of the physical locations associated with the plurality of intrusion events, and a physical crime events overlay of geographical locations of the physical crime locations;

    identifying via the processor geographical pockets of threats derived from the fraud event locations, the intrusion events locations, and the physical crime locations, displayed on the generated multi-overlay map; and

    prioritizing via the processor threat response resources according to the identified geographical pockets of threats.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×