Log in
Enquire now
‌

US Patent 10419469 Graph-based user tracking and threat detection

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
104194690
Patent Inventor Names
Vikram Kapoor0
Yijou Chen0
Harish Kumar Bharat Singh0
Murat Bog0
Date of Patent
September 17, 2019
0
Patent Application Number
161348210
Date Filed
September 18, 2018
0
Patent Citations
‌
US Patent 10033611 Transaction lifecycle management
‌
US Patent 10142357 Systems and methods for preventing malicious network connections using correlation-based anomaly detection
‌
US Patent 10127273 Distributed processing of network data using remote capture agents
‌
US Patent 10115111 Modeling users for fraud detection and analysis
Patent Citations Received
‌
US Patent 12130878 Deduplication of monitored communications data in a cloud environment
0
‌
US Patent 12095796 Instruction-level threat assessment
0
‌
US Patent 12095879 Identifying encountered and unencountered conditions in software applications
0
‌
US Patent 12113816 Anomaly detection device, anomaly detection method and anomaly detection program
0
‌
US Patent 12120140 Detecting threats against computing resources based on user behavior changes
0
‌
US Patent 12126643 Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment
0
‌
US Patent 12126695 Enhancing security of a cloud deployment based on learnings from other cloud deployments
0
‌
US Patent 11483329 Using a logical graph of a containerized network environment
...
Patent Primary Examiner
‌
Mahfuzur Rahman
0
Patent abstract

Log data associated with at least one user session associated with an original user is received. A logical graph is generated using at least a portion of the received log data. One example of such a logical graph is a privilege change graph that models privilege changes between processes. Another example of such a logical graph is a user login graph that models machines with which the original user interacts. Another example of such a logical graph is a machine-server graph that clusters machines into nodes based on resources executing on the machine. The generated logical graph is used to detect an anomaly. The detected anomaly is recorded.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10419469 Graph-based user tracking and threat detection

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us