Bank of America Corporation (20240380764). Multi-Computer System for Comprehensive Threat Detection and Mitigation simplified abstract
Contents
Multi-Computer System for Comprehensive Threat Detection and Mitigation
Organization Name
Inventor(s)
Benjamin F. Tweel of Romeoville IL (US)
Neal Aaron Slensker of Fort Mill SC (US)
James Siekman of Charlotte NC (US)
Shannon Sabina Rolinger of Pineville NC (US)
John Raymond Omernik of Wittenberg WI (US)
Rebecca Lynn Pietro of Indian Land SC (US)
Multi-Computer System for Comprehensive Threat Detection and Mitigation - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240380764 titled 'Multi-Computer System for Comprehensive Threat Detection and Mitigation
The patent application provides arrangements for comprehensive threat mitigation, including cybersecurity threats.
- An indication of a threat or potential threat is received from an external entity.
- Identifying data associated with the external entity is extracted from the indication.
- Pre-stored customizations associated with mitigating actions of the external entity are retrieved using the identifying data.
- Mitigating actions are identified based on the retrieved customizations.
- Instructions to execute the mitigating actions are generated and transmitted to computing devices for execution.
Potential Applications: - Cybersecurity threat mitigation in various industries. - Enhancing threat response capabilities for organizations. - Improving overall security measures in the digital space.
Problems Solved: - Efficient and customized threat mitigation strategies. - Streamlining the response to potential threats. - Enhancing overall cybersecurity protocols.
Benefits: - Enhanced security posture. - Customized threat response. - Improved efficiency in threat mitigation efforts.
Commercial Applications: Title: Customized Cybersecurity Threat Mitigation Solutions This technology can be applied in industries such as finance, healthcare, and government to enhance cybersecurity measures and protect sensitive data from potential threats.
Questions about Cybersecurity Threat Mitigation: 1. How does this technology differentiate between various types of threats?
- The technology uses identifying data to retrieve customizations tailored to specific threats, enabling it to differentiate and respond accordingly.
2. Can this technology be integrated with existing cybersecurity systems?
- Yes, this technology can be integrated with existing systems to enhance threat mitigation capabilities.
Original Abstract Submitted
arrangements for comprehensive threat mitigation are provided. in some aspects, an indication of threat or potential threat may be received from an external entity. in some examples, the threat may include a cybersecurity threat. in response to receiving the indication of threat, identifying data associated with the external entity may be extracted from the indication and used to retrieve pre-stored customizations associated with the desired mitigating actions of the external entity. the one or more mitigating actions may be identified and instructions to execute the one or more mitigating actions may be generated and transmitted to one or more computing devices for execution.