The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 26, 2023

Filed:

Jan. 04, 2021
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

William Wesley Beaver, Austin, TX (US);

Oner Sufri, Frisco, TX (US);

Kevin Potter, Brooklyn, NY (US);

Shirley M. Han, New York, NY (US);

Zachary Ryan, Queens, NY (US);

Kyle Greeley, Ann Arbor, MI (US);

ChunHui Y. Higgins, Raleigh, NC (US);

Omar Hammami, Blaine, MN (US);

Gustavo Adolfo Arismendi Camero, Katy, TX (US);

Ryan West, Columbus, OH (US);

Emilio Fiallos, Belleville, NJ (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/40 (2022.01); G06N 20/00 (2019.01); G06F 18/23 (2023.01);
U.S. Cl.
CPC ...
H04L 63/1491 (2013.01); G06F 18/23 (2023.01); G06N 20/00 (2019.01); H04L 63/1466 (2013.01);
Abstract

A computer-implemented method, computer system, and computer program product for threat management. A set of features used by a machine learning model is collected by the computer system to determine a threat type for an access attempt when the access attempt is detected. A cluster is determined, by the machine learning model in the computer system, for the access attempt using the set of features, wherein the machine learning model implements clustering to determine the cluster for the access attempt, and wherein the cluster for the access attempt corresponds to the threat type for the access attempt. A set of actions is performed by the machine learning model in the computer system based on the threat type determined for the access attempt.


Find Patent Forward Citations

Loading…