The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 24, 2016

Filed:

Sep. 18, 2014
Applicant:

Trustpipe Llc, Healdsburg, CA (US);

Inventors:

John S. Flowers, San Francisco, CA (US);

Ridgely C. Evers, Healdsburg, CA (US);

Assignee:

TRUSTPIPE LLC, Healdsburg, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 15/173 (2006.01); H04L 29/06 (2006.01); H04L 12/801 (2013.01); H04L 29/12 (2006.01);
U.S. Cl.
CPC ...
H04L 63/0245 (2013.01); H04L 29/06095 (2013.01); H04L 29/06931 (2013.01); H04L 63/14 (2013.01); H04L 63/145 (2013.01); H04L 63/1416 (2013.01); H04L 63/1466 (2013.01); H04L 69/22 (2013.01); H04L 47/193 (2013.01); H04L 61/6063 (2013.01);
Abstract

A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.


Find Patent Forward Citations

Loading…