-
公开(公告)号:US20150074579A1
公开(公告)日:2015-03-12
申请号:US14021585
申请日:2013-09-09
发明人: Philip John Steuart Gladstone , Alan Joseph Kirby , John Matthew Truelove , David Feinzeig , Nagarjuna Venna , Stephen Boyer
IPC分类号: H04L29/06 , G06F3/0484
CPC分类号: H04L63/1425 , G06F3/0484 , G06Q30/0277 , G06Q50/01 , H04L61/1511 , H04L63/1416 , H04L63/1433 , H04L63/1441
摘要: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
摘要翻译: 其中包括与实体关联的在线用户的活动的跟踪。 通过对跟踪的分析,推断实体的安全状态。 另外,(a)有助于各实体的安全特征的技术资产和(b)与各技术资产相关的实体的身份之间产生地图。 映射的生成的至少一部分是自动完成的。 可以通过用户界面(a)关于实体的技术资产的数据呈现给用户来帮助用户生成地图,以及(b)用于将技术资产与实体的身份相关联的交互式工具 。
-
公开(公告)号:US20230421600A1
公开(公告)日:2023-12-28
申请号:US18461087
申请日:2023-09-05
IPC分类号: H04L9/40 , H04L43/062 , H04L67/53 , H04L61/5007 , H04L43/0876 , G06Q10/0639
CPC分类号: H04L63/1433 , H04L43/062 , H04L67/53 , H04L63/145 , H04L43/0876 , G06Q10/0639 , H04L61/5007
摘要: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
-
公开(公告)号:US11777976B2
公开(公告)日:2023-10-03
申请号:US17069151
申请日:2020-10-13
IPC分类号: H04L9/40 , G06Q10/0639 , H04L61/5007 , H04L67/53 , H04L43/062 , H04L43/0876
CPC分类号: H04L63/1433 , G06Q10/0639 , H04L43/062 , H04L43/0876 , H04L61/5007 , H04L67/53 , H04L63/145
摘要: A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system.
-
公开(公告)号:US20230247041A1
公开(公告)日:2023-08-03
申请号:US18297863
申请日:2023-04-10
发明人: Philip John Steuart Gladstone , Alan Joseph Kirby , John Matthew Truelove , David Feinzeig , Nagarjuna Venna , Stephen Boyer
IPC分类号: H04L9/40 , G06F3/0484 , H04L61/4511 , G06Q30/0241 , G06Q50/00
CPC分类号: H04L63/1425 , H04L63/1433 , G06F3/0484 , H04L61/4511 , G06Q30/0277 , G06Q50/01 , H04L63/1416 , H04L63/1441
摘要: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
-
公开(公告)号:US10554619B2
公开(公告)日:2020-02-04
申请号:US16543075
申请日:2019-08-16
摘要: A computer-implemented method is provided for mapping IP addresses and domain names to organizations. The method includes receiving, by a mapping system from an data provider, a dataset related to a plurality of users of the data provider. The dataset includes (a) an IP address for a user device of each user of the plurality of users, and (b) a domain name for a user account of each user of the plurality of users; enriching, by an analytics engine of the mapping system, the received dataset with enrichment data from an enrichment source; receiving, by the analytics engine from a storage medium, historical data relevant to the enriched dataset; and mapping, by the analytics engine, (i) the IP address and/or (ii) the domain name of each user of a portion of the plurality of users to an organization based on the enriched dataset and the historical data.
-
公开(公告)号:US10425380B2
公开(公告)日:2019-09-24
申请号:US16015686
申请日:2018-06-22
摘要: A computer-implemented method is provided for mapping IP addresses and domain names to organizations. The method includes receiving, by a mapping system from an data provider, a dataset related to a plurality of users of the data provider. The dataset includes (a) an IP address for a user device of each user of the plurality of users, and (b) a domain name for a user account of each user of the plurality of users; enriching, by an analytics engine of the mapping system, the received dataset with enrichment data from an enrichment source; receiving, by the analytics engine from a storage medium, historical data relevant to the enriched dataset; and mapping, by the analytics engine, (i) the IP address and/or (ii) the domain name of each user of a portion of the plurality of users to an organization based on the enriched dataset and the historical data.
-
公开(公告)号:US20190260791A1
公开(公告)日:2019-08-22
申请号:US16405121
申请日:2019-05-07
发明人: Phiip John Steuart Gladstone , Alan Joseph Kirby , John Matthew Truelove , David Feinzeig , Nagarjuna Venna , Stephen Boyer
IPC分类号: H04L29/06 , H04L29/12 , G06Q30/02 , G06F3/0484 , G06Q50/00
摘要: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user-interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
-
28.
公开(公告)号:US20180375822A1
公开(公告)日:2018-12-27
申请号:US16015686
申请日:2018-06-22
IPC分类号: H04L29/12
CPC分类号: H04L61/2007 , H04L51/28 , H04L61/1505 , H04L61/1511 , H04L67/306
摘要: A computer-implemented method is provided for mapping IP addresses and domain names to organizations. The method includes receiving, by a mapping system from an data provider, a dataset related to a plurality of users of the data provider. The dataset includes (a) an IP address for a user device of each user of the plurality of users, and (b) a domain name for a user account of each user of the plurality of users; enriching, by an analytics engine of the mapping system, the received dataset with enrichment data from an enrichment source; receiving, by the analytics engine from a storage medium, historical data relevant to the enriched dataset; and mapping, by the analytics engine, (i) the IP address and/or (ii) the domain name of each user of a portion of the plurality of users to an organization based on the enriched dataset and the historical data.
-
公开(公告)号:US09680858B1
公开(公告)日:2017-06-13
申请号:US15134845
申请日:2016-04-21
CPC分类号: H04L63/1433 , G06F3/0484 , G06Q30/0277 , G06Q50/01 , H04L63/1441
摘要: Among other things, information is acquired and stored that is indicative of security risks associated with security subjects and with entities to which the security subjects belong. The stored information is analyzed by computer to derive security indicators for the entities. With respect to entities selected by the users, security information is presented by computer to users. The security information includes security indicators for the entities and security information for security subjects. The security information for security subjects includes annotations provided by users. The annotations are managed by computer based on communications from the users.
-
公开(公告)号:US20170093901A1
公开(公告)日:2017-03-30
申请号:US15239063
申请日:2016-08-17
发明人: Philip J. Gladstone , Alan J. Kirby , John M. Truelove , David Feinzeig , Nagarjuna Venna , Stephen Boyer
CPC分类号: H04L63/1425 , G06F3/0484 , G06Q30/0277 , G06Q50/01 , H04L61/1511 , H04L63/1416 , H04L63/1433 , H04L63/1441
摘要: Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
-
-
-
-
-
-
-
-
-