US Patent Application 17664718. PREDICTIVE SERVICE ORCHESTRATION USING THREAT MODELING ANALYTICS simplified abstract

From WikiPatents
Jump to navigation Jump to search

PREDICTIVE SERVICE ORCHESTRATION USING THREAT MODELING ANALYTICS

Organization Name

International Business Machines Corporation

Inventor(s)

ASMAHAN Ali of Poughkeepsie NY (US)

Mustafa Mah of Poughkeepsie NY (US)

Abhishek Jain of Baraut (IN)

Sasikanth Eda of Vijayawada (IN)

PREDICTIVE SERVICE ORCHESTRATION USING THREAT MODELING ANALYTICS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17664718 titled 'PREDICTIVE SERVICE ORCHESTRATION USING THREAT MODELING ANALYTICS

Simplified Explanation

- This patent application describes a computer-implemented method, system, and computer program product for predictive service orchestration using threat modeling analytics. - The method involves identifying attributes of a client computing environment and collecting threat modeling content for various vendor computing environments. - The threat modeling content is then analyzed and compared with the attributes of the client computing environment. - Based on this comparison, a client threat model is generated for the client computing environment. - The innovation aims to provide a predictive service orchestration system that can assess potential threats in a client's computing environment by analyzing threat modeling content from different vendors. - This can help in identifying and addressing potential security risks and vulnerabilities in the client's system. - The system utilizes threat modeling analytics to provide a more accurate and comprehensive understanding of the threats that may affect the client's computing environment. - By generating a client threat model, the system can assist in making informed decisions regarding service orchestration and security measures for the client's system.


Original Abstract Submitted

Provided is a computer-implemented method, system, and computer program product for predictive service orchestration using threat modeling analytics. A processor may identify a plurality of attributes of a client computing environment. The processor may collect threat modeling content for a plurality of vendor computing environments. The processor may analyze the threat modeling content for the plurality of vendor computing environments. The processor may compare the analyzed threat modeling content for the plurality of vendor computing environments with the plurality of attributes of the client computing environment. The processor may generate, based on the comparing, a client threat model for the client computing environment.