Context aware threat protection
First Claim
1. A method performed by at least one hardware processor for dynamic threat protection comprising:
- dynamically receiving real-time contextual data from a data source associated with a client and a subscriber list, the real-time contextual data including at least two of authentication data, Internet Protocol (IP) data, wireless roaming data, network path data, payment data, account data, virus scan data, session data, client data, client location data, session encryption data, client network data, and client reputation data;
analyzing the real-time contextual data to determine a security threat score associated with the client, the analyzing including evaluating whether the payment data received from the subscriber list is valid;
assigning the security threat score to the client using the analysis;
automatically applying a security policy to the client using the security threat score, the applying including;
providing a higher quality of service to the client when the payment data is valid; and
providing a lower quality of service to the client when the payment data is not valid;
determining whether the security threat score assigned to the client is above a predetermined threshold threat score; and
based on the determining, selectively analyzing, contents of data packets associated with the client for adherence to a predetermined standard, the data packets being carried between the client and a server by a data network.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for dynamic threat protection are disclosed. An example method for dynamic threat protection may commence with receiving real-time contextual data from at least one data source associated with a client. The method may further include analyzing the real-time contextual data to determine a security threat score associated with the client. The method may continue with assigning, based on the analysis, the security threat score to the client. The method may further include automatically applying a security policy to the client. The security policy may be applied based on the security threat score assigned to the client.
-
Citations
18 Claims
-
1. A method performed by at least one hardware processor for dynamic threat protection comprising:
-
dynamically receiving real-time contextual data from a data source associated with a client and a subscriber list, the real-time contextual data including at least two of authentication data, Internet Protocol (IP) data, wireless roaming data, network path data, payment data, account data, virus scan data, session data, client data, client location data, session encryption data, client network data, and client reputation data; analyzing the real-time contextual data to determine a security threat score associated with the client, the analyzing including evaluating whether the payment data received from the subscriber list is valid; assigning the security threat score to the client using the analysis; automatically applying a security policy to the client using the security threat score, the applying including; providing a higher quality of service to the client when the payment data is valid; and
providing a lower quality of service to the client when the payment data is not valid;determining whether the security threat score assigned to the client is above a predetermined threshold threat score; and based on the determining, selectively analyzing, contents of data packets associated with the client for adherence to a predetermined standard, the data packets being carried between the client and a server by a data network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A dynamic threat protection system comprising:
-
at least one processor; and a memory communicatively coupled to the at least one processor, the memory storing instructions executable by the at least one processor to perform a method comprising; dynamically receiving real-time contextual data from a data source associated with a client and a subscriber list, the real-time contextual data including at least two of authentication data, Internet Protocol (IP) data, wireless roaming data, network path data, payment data, account data, virus scan data, session data, client data, client location data, session encryption data, client network data, and client reputation data; analyzing the real-time contextual data to determine a security threat score associated with the client, the analyzing including evaluating whether the payment data received from the subscriber list is valid; assigning the security threat score to the client using the analysis; and automatically applying a security policy to the client using the security threat score, the applying including; providing a higher quality of service to the client when the payment data is valid; and
providing a lower quality of service to the client when the payment data is not valid;determining whether the security threat score assigned to the client is above a predetermined threshold threat score; and based on the determining, selectively analyzing contents of data packets associated with the client for adherence to a predetermined standard, the data packets being carried between the client and a server by a data network. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by at least one processor to perform a method for dynamic threat protection, the method comprising:
-
dynamically receiving real-time contextual data from a data source associated with a client and a subscriber list, the real-time contextual data including at least two of authentication data, Internet Protocol (IP) data, wireless roaming data, network path data, payment data, account data, virus scan data, session data, client data, client location data, session encryption data, client network data, and client reputation data; analyzing the real-time contextual data to determine a security threat score associated with the client, the analyzing including evaluating whether the payment data received from the subscriber list is valid; assigning the security threat score to the client using the analysis; automatically applying a security policy to the client using the security threat score, the applying including; providing a higher quality of service to the client when the payment data is valid; and
providing a lower quality of service to the client when the payment data is not valid;determining whether the security threat score assigned to the client is above a predetermined threshold threat score; and based on the determining, selectively analyzing contents of data packets associated with the client for adherence to a predetermined standard, the data packets being carried between the client and a server by a data network.
-
Specification