Log in
Enquire now
‌

US Patent 10367834 Systems and methods for implementing intrusion prevention

Patent 10367834 was granted and assigned to CloudPassage on July, 2019 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Patent abstractTimelineTable: Further ResourcesReferences
Is a
Patent
Patent

Patent attributes

Patent Applicant
CloudPassage
CloudPassage
Current Assignee
CloudPassage
CloudPassage
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
Patent Number
10367834
Date of Patent
July 30, 2019
Patent Application Number
15571364
Date Filed
May 12, 2016
Patent Citations
‌
US Patent 10044730 Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system
Patent Citations Received
‌
US Patent 11914696 Quorum-based access control management
4
‌
US Patent 11777979 System and method to perform automated red teaming in an organizational network
‌
US Patent 11356851 Communications system having multiple carriers with selectively transmitted real information and fake information and associated methods
‌
US Patent 11482218 Voice control method, voice control device, and computer-executable non-volatile storage medium
‌
US Patent 10601807 Systems and methods for providing container security
‌
US Patent 11252178 System and method for automating security configuration standards assessments and mitigations
‌
US Patent 11716345 System and method for automating security configuration standards assessments and mitigations
12
Patent Primary Examiner
‌
Taghi T. Arani
Patent abstract

System and methods are provided for implementing an intrusion prevention system in which data collected at one or more remote computing assets is analyzed against a plurality of workflow templates. Each template corresponding to a different threat vector and comprises: (i) a trigger definition, (ii) an authorization token, and (iii) an enumerated countermeasure responsive to the corresponding threat vector. When a match between the data collected at the one or more remote computing assets and a trigger definition of a corresponding workflow template is identified, an active threat is deemed to be identified. When this occurs the authorization token of the corresponding workflow template is enacted by obtaining authorization from at least two authorization contacts across established trust channels for the at least two authorization contacts. Responsive to obtaining this authorization, the enumerated countermeasure of the corresponding workflow template is executed.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10367834 Systems and methods for implementing intrusion prevention

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.