Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020093045 - AHEAD OF TIME APPLICATION LAUNCHING FOR CYBERSECURITY THREAT INTELLIGENCE OF NETWORK SECURITY EVENTS

Publication Number WO/2020/093045
Publication Date 07.05.2020
International Application No. PCT/US2019/059656
International Filing Date 04.11.2019
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
G06F 21/57 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
CPC
G06F 21/51
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
51at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
G06F 21/629
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
629to features or functions of an application
G06F 9/445
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
9Arrangements for program control, e.g. control units
06using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
44Arrangements for executing specific programs
445Program loading or initiating
G06F 9/542
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
9Arrangements for program control, e.g. control units
06using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
46Multiprogramming arrangements
54Interprogram communication
542Event management; Broadcasting; Multicasting; Notifications
Applicants
  • THREATCONNECT, INC. [US]/[US]
Inventors
  • TINEO, Danny
Agents
  • MEYER, Mercedes
  • ADAM SCHLOSSER
  • BRONWEN LOEB
  • CHRISTOPHER BRUENJES
  • JAMES CARPENTER
  • JOHN SMITH
  • NIKOLA COLIC
  • PETER SISTARE
  • WILLIAM FOSTER
  • ZHENGYU FENG
Priority Data
16/178,94602.11.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) AHEAD OF TIME APPLICATION LAUNCHING FOR CYBERSECURITY THREAT INTELLIGENCE OF NETWORK SECURITY EVENTS
(FR) LANCEMENT ANTICIPÉ D'APPLICATIONS POUR AMÉLIORER LA CYBER THREAT INTELLIGENCE D'ÉVÉNEMENTS DE SÉCURITÉ D'UN RÉSEAU
Abstract
(EN)
Systems, methods, and computer-readable storage devices are disclosed for improve cybersecurity intelligence by launching applications ahead of time. One method including: receiving, over a communications network, at least one threat model; determining whether a performance of an orchestrated response is triggered based on the at least one threat model, wherein the orchestrated response includes a plurality of applications to be executed in a predetermined sequence; and launching, when the performance of the orchestrated response is triggered, a first application and a second application of the plurality of applications of the orchestrated response, wherein the second application executes after execution of the first application has completed execution.
(FR)
L'invention concerne des systèmes, des procédés, et des dispositifs de stockage lisibles par ordinateur pour améliorer la Cyber Threat Intelligence d'un réseau en lançant des applications à l'avance. Un procédé consiste à : recevoir, sur un réseau de communications, au moins un modèle de menace ; déterminer si une performance d'une réponse orchestrée est déclenchée sur la base du ou des modèles de menace, la réponse orchestrée comprenant une pluralité d'applications devant s'exécuter selon une séquence prédéterminée ; et, lorsque la performance de la réponse orchestrée est déclenchée, lancer une première application et une deuxième application de la pluralité d'applications de la réponse orchestrée, la deuxième application s'exécutant après que la première application s'est exécutée.
Latest bibliographic data on file with the International Bureau