MICROSOFT TECHNOLOGY LICENSING, LLC (20240259416). ADAPTIVE PROTECTION MECHANISMS LOOP simplified abstract

From WikiPatents
Jump to navigation Jump to search

ADAPTIVE PROTECTION MECHANISMS LOOP

Organization Name

MICROSOFT TECHNOLOGY LICENSING, LLC

Inventor(s)

Erin K. Miyake of Seattle WA (US)

Bhavanesh Rengarajan of Sammamish WA (US)

Tanay Baldua of Mumbai (IN)

Talhah Munawar Mir of Bothell WA (US)

Rudra Mitra of Yarrow Point WA (US)

Apsara Karen Selvanayagam of London (GB)

John Alphonse of Redmond WA (US)

Ethan Max Stakoff of Seattle WA (US)

Jiajun Zhang of Bellevue WA (US)

Sizhe Zheng of West Lafayette IN (US)

Ruben Eugenio Cantu Vota of Seattle WA (US)

Kun Yao of Bellevue WA (US)

Xin Liu of Mercer Island WA (US)

Maithili Dandige of Kirkland WA (US)

Hubert Dushime of Vancouver (CA)

ADAPTIVE PROTECTION MECHANISMS LOOP - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240259416 titled 'ADAPTIVE PROTECTION MECHANISMS LOOP

The patent application describes a system that connects a risk score with cybersecurity protection mechanisms and user interactions data in a feedback loop.

  • The risk score guides protection activities by the protection mechanisms, influencing various user interactions.
  • Protection activities and user interactions are recorded in audit logs, which are used to update a risk scoring model.
  • The risk scoring model then updates the risk score, prompting the protection mechanisms to adapt their activities accordingly.
  • Security tools for insider risk management, data leak prevention, and conditional access are enhanced to provide adaptive protection based on the updated risk score.
      1. Potential Applications:

This technology can be applied in various industries such as finance, healthcare, and government to enhance cybersecurity measures and protect sensitive data.

      1. Problems Solved:

The system addresses the need for adaptive protection mechanisms that can respond to changing risk levels in real-time, improving overall cybersecurity posture.

      1. Benefits:

- Enhanced protection against insider threats and data breaches - Real-time risk assessment and adaptive security measures - Improved compliance with data protection regulations

      1. Commercial Applications:

The technology can be utilized by cybersecurity companies, government agencies, and large enterprises to strengthen their security infrastructure and protect critical assets.

      1. Prior Art:

Researchers in the field of cybersecurity and risk management have explored similar concepts of adaptive protection mechanisms based on risk scores. Further investigation into academic journals and patent databases may reveal relevant prior art.

      1. Frequently Updated Research:

Stay informed about the latest advancements in cybersecurity risk assessment and adaptive protection mechanisms to ensure the system remains effective and up-to-date.

        1. Questions about the Technology:

1. How does the system ensure the accuracy and reliability of the risk scoring model? 2. What are the potential challenges in implementing adaptive protection mechanisms based on user interactions and audit logs?


Original Abstract Submitted

some embodiments operationally connect a risk score with cybersecurity protection mechanisms and user interactions data in a feedback loop. the risk score guides protection activities by the protection mechanisms, thereby prompting or preventing various user interactions. the protection activities and the user interactions are recorded in audit logs, and curated data based on the audit logs is fed to a risk scoring model as input. the risk scoring model then updates the risk score, and the loop repeats as the protection mechanisms alter their protection activities based on the updated risk score, thereby providing adaptive protection. security tools for insider risk management, data leak prevention, and conditional access are enhanced to provide adaptive protection, by recording protection activities and user interactions for use as risk model input, and by checking regularly for risk score updates and modifying their protection activities accordingly.