Geographical intrusion mapping system using telecommunication billing and inventory systems
First Claim
Patent Images
1. A computer-implemented method for geographically mapping a threat presented to a computing network, comprising:
- receiving threat data associated with the threat, the threat data including an Internet Protocol (IP) address of a Voice over Internet Protocol (VoIP) call;
using the IP address to retrieve identification data associated with the threat, the identification data including caller ID information of the VoIP call;
using the caller ID information to identify location data associated with the threat, the location data including a geographical location of the threat;
correlating the threat data and the identification data with the location data to generate map data; and
generating, by a processor associated with the computer, a geographical map displaying the geographical location of the threat based on the map data.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for geographically mapping a threat into a network having one or more network points include receiving threat information identifying a threat to a point of the network, correlating the threat information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the threat.
68 Citations
7 Claims
-
1. A computer-implemented method for geographically mapping a threat presented to a computing network, comprising:
-
receiving threat data associated with the threat, the threat data including an Internet Protocol (IP) address of a Voice over Internet Protocol (VoIP) call; using the IP address to retrieve identification data associated with the threat, the identification data including caller ID information of the VoIP call; using the caller ID information to identify location data associated with the threat, the location data including a geographical location of the threat; correlating the threat data and the identification data with the location data to generate map data; and generating, by a processor associated with the computer, a geographical map displaying the geographical location of the threat based on the map data. - View Dependent Claims (2, 3, 4)
-
-
5. A system for geographically mapping a threat, comprising:
-
a network security system configured to provide threat data, the threat data including an Internet Protocol (IP) address of a Voice over Internet Protocol (VoIP) call; an identification system configured to receive the threat data from the network security system and retrieve identification data associated with the threat, based on the IP address of the threat data, the identification data including caller ID information of the VoIP call; a location system configured to receive the identification data from the identification system and identify location data associated with the threat, based on the caller ID information of the identification data, the location data including a geographical location of the threat; a mapping system configured to; receive the threat data and the location data; generate map data by correlating the threat data with the location data; and generate a geographical map reflecting the geographical location of the threat based on the map data; and a display device configured to communicate with the mapping system to display the generated map. - View Dependent Claims (6, 7)
-
Specification