Systems and methods for dynamic protection from electronic attacks
First Claim
Patent Images
1. A system for reducing the security risk of computer transactions over a computer network, the system comprising:
- (a) a first computer on the computer network, wherein the first computer has a first computer network address and communicates with a second computer on the computer network;
(b) a communication between the first computer and the second computer, wherein the act of the first computer communicating with the second computer comprises an indication of the first computer being engaged in a risk, wherein the communication comprises the first computer network address;
(c) one or more real-time risk rating engines on the computer network, wherein the one or more real-time risk rating engines;
(i) receive data from one or more collection agents, the data comprising a plurality of network addresses; and
(ii) autonomously detect and analyze the communication by an inductive logic algorithm to rate, classify and rank the risk of the first computer network address based on the plurality of network addresses in real-time.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for gathering, classifying, and evaluating real time security intelligence data concerning security threats presented by an IP address, and reporting in real time the degree and character of such security threats.
-
Citations
30 Claims
-
1. A system for reducing the security risk of computer transactions over a computer network, the system comprising:
-
(a) a first computer on the computer network, wherein the first computer has a first computer network address and communicates with a second computer on the computer network; (b) a communication between the first computer and the second computer, wherein the act of the first computer communicating with the second computer comprises an indication of the first computer being engaged in a risk, wherein the communication comprises the first computer network address; (c) one or more real-time risk rating engines on the computer network, wherein the one or more real-time risk rating engines; (i) receive data from one or more collection agents, the data comprising a plurality of network addresses; and (ii) autonomously detect and analyze the communication by an inductive logic algorithm to rate, classify and rank the risk of the first computer network address based on the plurality of network addresses in real-time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable media for reducing the security risk of computer transactions over a computer network, the media comprising:
-
(a) instructions for detecting a communication between a first computer and a second computer, wherein the first computer has a first network address, wherein the communication comprises an indication of the first computer being engaged in a risk, and wherein the communication comprises the first computer network address; and (b) instructions for rating risk in real-time, wherein the rating comprises; (i) receiving data from one or more collection agents, the data comprising a plurality of network addresses; and (ii) autonomously detecting and analyzing the communication by an inductive logic algorithm to rate, classify, and rank the risk of the first computer network address based on the plurality of network addresses in real-time. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for reducing the security risk of computer transactions over a computer network, the method comprising:
-
(a) detecting a communication between a first computer and a second computer, wherein the first computer has a first network address, wherein the communication comprises an indication of the first computer being engaged in a risk, and wherein the communication comprises the first computer network address; and (b) rating the risk in real-time, wherein the rating comprises; (i) receiving data from one or more collection agents, the data comprising a plurality of network addresses; and (ii) autonomously detecting and analyzing the communication by an inductive logic algorithm to rate, classify, and rank the risk of the first computer network address based on the plurality of network addresses in real-time. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification