Log in
Enquire now
‌

US Patent 10063583 System and method of mitigating cyber attack risks

Patent 10063583 was granted and assigned to FireEye on August, 2018 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
FireEye
FireEye
0
Current Assignee
FireEye
FireEye
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
100635830
Patent Inventor Names
Matthew Keane0
John P. Watters0
Frederick Doyle0
Henry Peltokangas0
Date of Patent
August 28, 2018
0
Patent Application Number
156884530
Date Filed
August 28, 2017
0
Patent Citations Received
‌
US Patent 11985149 System and method for automated system for triage of cybersecurity threats
0
‌
US Patent 11677786 System and method for detecting and protecting against cybersecurity attacks on servers
0
‌
US Patent 11310238 System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources
‌
US Patent 11336675 Cyber resilience chaos stress testing
‌
US Patent 11316883 Cybersecurity—operational resilience of computer networks
‌
US Patent 11436327 System and method for circumventing evasive code for cyberthreat detection
‌
US Patent 11838300 Run-time configurable cybersecurity system
0
‌
US Patent 11888875 Subscription and key management system
0
...
Patent Primary Examiner
‌
William S Powers
0
Patent abstract

A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application stored in the memory. When executed by the computer, the application generates a report that comprises an identification of a cyber threat intent and the identification of a cyber threat technology, wherein the cyber threat intent is selected from a plurality of cyber threat intents listed in the cyber threat intent dictionary and wherein the cyber threat technology is selected from the technology dictionary. The application also populates values in a cyber threat progression vector, where the cyber threat progression vector comprises elements that each corresponds to an action in a chain of actions associated with a cybercrime, where the values correspond to one of present or not present. The vector is used to manage the cyber risk of an enterprise or organization.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10063583 System and method of mitigating cyber attack risks

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.