×

Network data collection and response system

  • US 9,854,057 B2
  • Filed: 05/06/2014
  • Issued: 12/26/2017
  • Est. Priority Date: 05/06/2014
  • Status: Active Grant
First Claim
Patent Images

1. An enterprise network that is accessible to a computing device, the enterprise network comprising:

  • local network resources accessible to the device via the enterprise network;

    a connection protocol server comprising a memory storing instructions and a processor executing the instructions, the processor of the connection protocol server executing instructions to assign a network address to the device to identify the device on the enterprise network in response to a network access request received from the device;

    a network data collection and response system of the enterprise network that is operative to track network activity of the device including a device inventory comprising device type and configuration information for the device and a resource utilization profile for the device without utilization of a data monitoring agent installed on the device;

    the network data collection and response system of the enterprise network is further operative to detect high-risk or unauthorized network activity involving the device through passive monitoring without utilization of a monitoring agent installed on the device, wherein to detect high-risk or unauthorized network activity comprises identifying attempted access to applications that offer services that are not authorized by the enterprise;

    the network data collection and response system further operative to implement a response action to mitigate the high-risk or unauthorized network activity, wherein the response action comprises one or more of;

    blocking the unauthorized network activity and providing notice to a user of the device that the device has attempted to conduct unauthorized network activity;

    notifying a user or monitoring system of the device of malware present on the device and removal of the malware from the device;

    detecting malware transmitted from the device; and

    removal of the malware from the enterprise network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×