Systems and methods for dynamic protection from electronic attacks
First Claim
Patent Images
1. A system for reducing the security risk of transactions with a computer over a computer network, said system comprising:
- a. a computer network;
b. a first computer on said computer network, said first computer having a first computer network address and said first computer communicating with a second computer on said computer network;
c. a communication between said first computer and said second computer, said act of said first computer communicating with said second computer being indicative of a user of said first computer being engaged in a risk activity and said communication including said first computer network address;
d. a monitoring system on said computer network having one or more monitoring agents autonomously obtaining said first computer network address from said communication between said first computer and said second computer; and
e. one or more algorithms assigning a risk score to transactions over said computer network from said first computer network address, said risk based at least in part on content on said second computer;
wherein said monitoring system utilizes said risk score to inhibit a communication between said first computer and a third computer.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats.
-
Citations
12 Claims
-
1. A system for reducing the security risk of transactions with a computer over a computer network, said system comprising:
-
a. a computer network; b. a first computer on said computer network, said first computer having a first computer network address and said first computer communicating with a second computer on said computer network; c. a communication between said first computer and said second computer, said act of said first computer communicating with said second computer being indicative of a user of said first computer being engaged in a risk activity and said communication including said first computer network address; d. a monitoring system on said computer network having one or more monitoring agents autonomously obtaining said first computer network address from said communication between said first computer and said second computer; and e. one or more algorithms assigning a risk score to transactions over said computer network from said first computer network address, said risk based at least in part on content on said second computer; wherein said monitoring system utilizes said risk score to inhibit a communication between said first computer and a third computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable media, said media comprising:
-
a. computer-readable instructions for detecting a communication between a first computer and a second computer, said act of said first computer communicating with said second computer being indicative of a user of said first computer being engaged in a risk activity; b. computer-readable instructions for obtaining a network address from said first computer; c. computer-readable instructions for assigning a risk score and a risk category to said first computer network address, said risk category based at least in part on the content of said second computer; d. computer-readable instructions for storing said risk score and said risk category; and e. computer-readable instructions for utilizing said risk score and said risk category to inhibit communication between said first computer and a third computer. - View Dependent Claims (10, 11, 12)
-
Specification