×

Threat personalization

  • US 7,841,008 B1
  • Filed: 03/31/2006
  • Issued: 11/23/2010
  • Est. Priority Date: 03/31/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer-program product comprising a tangible, non-transitory computer readable medium containing computer program code comprising:

  • a threat personalization application for creating, on a host computer system of a user, a user'"'"'s security risk profile for a user, wherein said user is a human user of said host computer system;

    said user'"'"'s security risk profile is specific to said user; and

    said user'"'"'s security risk profile comprises;

    building said user'"'"'s security risk profile from a user'"'"'s behavior profile and a user'"'"'s system profile, wherein said user'"'"'s behavior profile is a personalized behavior of said user on said host computer system; and

    said user'"'"'s system profile is a profile of a personalized system of said user on said host computer system;

    said threat personalization application further for creating a personalized threat profile for a threat with respect to information on said host computer system of a user;

    said threat personalization application further for determining whether there is a correlation between said user'"'"'s security risk profile and said personalized threat profile; and

    said threat personalization application further for issuing a personalized alert to said user based on an outcome of said determining whether there is correlation,wherein upon said threat being detected, said personalized alert is a personalized reactive alert;

    and upon said threat not being detected, said personalized alert is a personalized proactive alert;

    wherein said user'"'"'s behavior profile is characterized by at least one attribute selected from the group comprising of;

    (1) accounts and memberships of said user;

    (2) online activities of said user;

    (3) network behavior of said user;

    (4) use of external devices by said user; and

    (5) update behavior of said user;

    wherein said user'"'"'s system profile is characterized by at least one attribute selected from the group comprising of;

         1) sensitive applications;

    (2) high-risk applications;

    (3) valuable data/files; and

    (4) system and application modification frequency.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×