Log in
Enquire now
‌

US Patent 10521584 Computer threat analysis service

Patent 10521584 was granted and assigned to Amazon on December, 2019 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent

Patent attributes

Patent Applicant
Amazon
Amazon
Current Assignee
Amazon
Amazon
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
Patent Number
10521584
Date of Patent
December 31, 2019
Patent Application Number
15688811
Date Filed
August 28, 2017
Patent Citations
‌
US Patent 10178119 Correlating threat information across multiple levels of distributed computing systems
‌
US Patent 10129276 Methods and apparatus for identifying suspicious domains using common user clustering
Patent Citations Received
‌
US Patent 12135789 Systems and methods of attack type and likelihood prediction
0
‌
US Patent 11507847 Gene expression programming
‌
US Patent 12126695 Enhancing security of a cloud deployment based on learnings from other cloud deployments
0
‌
US Patent 12130878 Deduplication of monitored communications data in a cloud environment
0
‌
US Patent 11503047 Relationship-based conversion of cyber threat data into a narrative-like format
‌
US Patent 11546378 Smart exposure of data to known attacker sessions
‌
US Patent 11032304 Ontology based persistent attack campaign detection
‌
US Patent 11611583 System and method for detection of malicious interactions in a computer network
0
...
Patent Primary Examiner
‌
Matthew Smithers
Patent abstract

A system acquires diagnostic information from event logs, trace files, and other diagnostic sources to reduce a set of event records. The event records are arranged in a graph based on correlations between individual event records. Correlations may be based on time, account, credentials, tags, instance identifiers, or other characteristics. The system analyzes the graph to identify anomalies such as data exfiltration anomalies, system compromises, or security events. In some implementations, the system deploys decoy resources within a customer computing environment. Interactions with the decoy resources are captured as event records and added to the graph.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10521584 Computer threat analysis service

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.