System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user support
First Claim
Patent Images
1. A non-transitory machine readable medium, on which are stored instructions, comprising instructions that when executed cause one or more programmable devices to:
- receive by a first computer system a first notification from a third computer, the first notification received over a network and indicating that a potential data leakage activity on a second computer has been detected by the third computer;
generate a user prompt on the first computer system in response to receiving the first notification from the third computer, wherein the user prompt comprises a plurality of choices for responding to the potential data leakage activity by isolating the second computer, wherein at least one of the plurality of choices is received from the third computer in the first notification, and wherein the plurality of choices includes a least two of the plurality of choices of disabling the second computer, disabling an account associated with the second computer, quarantining the second computer, and locking the second computer;
receive a user input after generating the user prompt, the user input indicating a response to the potential data leakage activity intended to isolate the second computer; and
attempt to isolate the second computer based on the user input,wherein the first computer system, the second computer, and the third computer are separate devices.
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential data leakage activity associated with a device is identified. Furthermore, at least one action is performed to isolate the device, based on user input received utilizing a user interface.
-
Citations
10 Claims
-
1. A non-transitory machine readable medium, on which are stored instructions, comprising instructions that when executed cause one or more programmable devices to:
-
receive by a first computer system a first notification from a third computer, the first notification received over a network and indicating that a potential data leakage activity on a second computer has been detected by the third computer; generate a user prompt on the first computer system in response to receiving the first notification from the third computer, wherein the user prompt comprises a plurality of choices for responding to the potential data leakage activity by isolating the second computer, wherein at least one of the plurality of choices is received from the third computer in the first notification, and wherein the plurality of choices includes a least two of the plurality of choices of disabling the second computer, disabling an account associated with the second computer, quarantining the second computer, and locking the second computer; receive a user input after generating the user prompt, the user input indicating a response to the potential data leakage activity intended to isolate the second computer; and attempt to isolate the second computer based on the user input, wherein the first computer system, the second computer, and the third computer are separate devices. - View Dependent Claims (2, 3)
-
-
4. A computer-implemented method, comprising:
-
receiving by a first computer system a first notification from a third computer regarding a second computer, the first notification received over a network and indicating that the second computer is vulnerable to data leakage; generating a user prompt on the first computer system after receiving the first notification from the third computer, wherein the user prompt comprises a plurality of choices for responding to the indication that the second computer is vulnerable to data leakage, at least one choice involving isolating the second computer, wherein at least one of the plurality of choices is received from the third computer in the first notification, and wherein the plurality of choices includes a least two of the plurality of choices of disabling the second computer, disabling an account associated with the second computer, quarantining the second computer, and locking the second computer; receiving a user input after generating the user prompt, the user input received upon a user interface comprising the user prompt, wherein the user input indicates a response to the indication that the second computer is vulnerable to data leakage intended to isolate the second computer; and attempting to isolate the second computer based on the user input, wherein the first computer system, the second computer, and the third computer are separate devices. - View Dependent Claims (5, 6, 7)
-
-
8. A system comprising:
-
a mobile portable computing device adapted to receive network communication; a display integral with the mobile portable computing device and adapted to provide a user interface upon the display; a user prompt generated within the user interface of the mobile portable computing device, the user prompt generated in response to a first notification from a third computer by network communication; the first notification from the third computer comprising an indication that a second computer is vulnerable to data leakage; the user prompt comprising a plurality of options for responding to the indication that the second computer is vulnerable to data leakage, at least one option associated with an action intended to isolate the second computer, wherein at least one of the plurality of options is received from the third computer in the first notification, and wherein the plurality of options includes a least two of the plurality of options of disabling the second computer, disabling an account associated with the second computer, quarantining the second computer, and locking the second computer; and the user interface having the capability to receive a user selection indicating an action intended to isolate the second computer. - View Dependent Claims (9, 10)
-
Specification