Context-aware training systems, apparatuses, and methods
First Claim
Patent Images
1. A computer-implemented method for training a user, comprising:
- by a sensor, sensing at least one action performed by the user and data corresponding to the at least one action to yield sensed data, wherein;
the sensor comprises a USB sensor device and the sensing comprises detecting that a user of an electronic device has connected a USB device to the electronic device,the sensor comprises a Wi-Fi sensor device and the sensing comprises detecting that the user has connected the electronic device to a Wi-Fi access point,the sensor comprises a Bluetooth headset usage detection sensor and the sensing comprises identifying Bluetooth headset use,the sensor comprises a camera coupled with a computer vision program, orthe sensor comprises a physical location tracking sensor and the sensing comprises detecting a location of the user;
by a computer system comprising a processor, executing computer-readable programming instructions that cause the system to;
access a data storage device that stores a training needs model that comprises an estimate of at least one of a cost and a benefit of exposing the user to at least one available training action,apply, to the training needs model, the sensed data to identify a cybersecurity threat scenario for which the user is at risk,access a collection of available training actions and select, based on the sensed data and the cybersecurity threat scenario, at least one training action from the collection of available training actions, andcause the selected at least one cybersecurity training action to be delivered to the user.
9 Assignments
0 Petitions
Accused Products
Abstract
Context-aware training systems, apparatuses and systems. The context-aware training systems, apparatuses and systems are computer-implemented and include sensing a user action and, based on a training needs model, estimating a cost or benefit to exposing the user to a training action, selecting a training action from a collection of available training actions and delivering the training action to the user if the user action indicates a need for the user to be trained and the cost or benefit to exposing the user to the training action indicates user exposure to the training action is warranted.
-
Citations
70 Claims
-
1. A computer-implemented method for training a user, comprising:
-
by a sensor, sensing at least one action performed by the user and data corresponding to the at least one action to yield sensed data, wherein; the sensor comprises a USB sensor device and the sensing comprises detecting that a user of an electronic device has connected a USB device to the electronic device, the sensor comprises a Wi-Fi sensor device and the sensing comprises detecting that the user has connected the electronic device to a Wi-Fi access point, the sensor comprises a Bluetooth headset usage detection sensor and the sensing comprises identifying Bluetooth headset use, the sensor comprises a camera coupled with a computer vision program, or the sensor comprises a physical location tracking sensor and the sensing comprises detecting a location of the user; by a computer system comprising a processor, executing computer-readable programming instructions that cause the system to; access a data storage device that stores a training needs model that comprises an estimate of at least one of a cost and a benefit of exposing the user to at least one available training action, apply, to the training needs model, the sensed data to identify a cybersecurity threat scenario for which the user is at risk, access a collection of available training actions and select, based on the sensed data and the cybersecurity threat scenario, at least one training action from the collection of available training actions, and cause the selected at least one cybersecurity training action to be delivered to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A computer-implemented training system, comprising:
-
a sensor configured to monitor at least one action performed by the user, wherein; the sensor comprises a USB sensor device and the action comprises that a user of an electronic device has connected a USB device to the electronic device, the sensor comprises a Wi-Fi sensor device and the action comprises that the user has connected the electronic device to a Wi-Fi access point, the sensor comprises a Bluetooth headset usage detection sensor and the sensing comprises identifying Bluetooth headset use, the sensor comprises a camera coupled with a computer vision program, or the sensor comprises a physical location tracking sensor and the sensing comprises detecting a location of the user; the electronic device; and a computer system that includes at least one processor, the computer system containing instructions which, when executed by the at least one processor, causes the computer system to; receive data from the sensor, the data pertaining to the performance by the user of at least one of the actions; apply the data to a training needs model to identify a cybersecurity threat scenario to which the user is at risk and estimate at least one of a cost and a benefit of exposing the user to at least one cybersecurity training action trained; access a collection of training actions and select one or more cybersecurity training actions from the collection that are relevant to the cybersecurity threat scenario and the sensed data; and provide the selected one or more cybersecurity training actions to the user through the electronic device. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
Specification