The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 15, 2018

Filed:

Nov. 19, 2013
Applicant:

Intel Corporation, Santa Clara, CA (US);

Inventors:

Abhilasha Bhargav-Spantzel, Santa Clara, CA (US);

John B. Vicente, Roseville, CA (US);

Mohammad R. Haghighat, San Jose, CA (US);

Oliver W. Chen, El Dorado Hills, CA (US);

Hormuzd M. Khosravi, Portland, OR (US);

Uri Kahana, Givat-Ada, IL;

Assignee:

INTEL CORPORATION, Santa Clara, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 12/14 (2006.01); H04L 29/06 (2006.01); G06F 3/0484 (2013.01); G06F 17/30 (2006.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01);
U.S. Cl.
CPC ...
H04L 63/1441 (2013.01); G06F 3/0484 (2013.01); G06F 17/30864 (2013.01); G06F 21/552 (2013.01); G06F 21/577 (2013.01); G06F 2221/2105 (2013.01);
Abstract

This disclosure is directed to a context-aware proactive threat management system. In general, a device may use internal activity data along with data about external activities (e.g., provided by remote resources) for threat assessment and mitigation. A device may comprise, for example, a hostile environment detection (HED) module to coordinate threat assessment and mitigation. The HED module may accumulate internal activity data (e.g., from security services in the device), and external activity data regarding a system environment and/or a physical environment from the remote resources. The HED module may then assess threats based on the activity data and determine automated and/or manual mitigation operations to respond to the threats. In one embodiment, visualization features may also be used to, for example, visualize threats to a user, visualize automatic/manual mitigation operations, request user confirmation regarding the performance of manual mitigation operations, etc.


Find Patent Forward Citations

Loading…