ReliaQuest Holdings, LLC (20240289367). THREAT MITIGATION SYSTEM AND METHOD simplified abstract
Contents
THREAT MITIGATION SYSTEM AND METHOD
Organization Name
Inventor(s)
Brian P. Murphy of Tampa FL (US)
Colin O'connor of Tampa FL (US)
Jason Pfeiffer of Tampa FL (US)
Brian Philip Murphy of St. Petersburg FL (US)
Jonathan R. Echavarria of Tampa FL (US)
THREAT MITIGATION SYSTEM AND METHOD - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240289367 titled 'THREAT MITIGATION SYSTEM AND METHOD
The abstract describes a method, program, and system for generating detection rules based on historical data, monitoring activity for security events, and processing notifications using AI.
- Method, program, and system for generating detection rules based on historical suspect activity and security events
- Monitoring activity within a computing platform to identify suspect activity indicative of a security event
- Generating an initial notification of the security event with specific details in a computer-readable language
- Iteratively processing the initial notification using a generative AI model and formatting script to create a human-readable report
Potential Applications: - Cybersecurity systems - Intrusion detection systems - Security event monitoring tools
Problems Solved: - Efficiently detecting and responding to security events - Automating the process of generating security event reports
Benefits: - Improved security incident response - Enhanced threat detection capabilities - Streamlined reporting processes
Commercial Applications: Title: Automated Security Event Detection and Reporting System Description: This technology can be used in cybersecurity companies, IT departments, and organizations with sensitive data to enhance their security measures and incident response capabilities.
Prior Art: Researchers can explore existing patents related to AI-based security event detection systems, historical data analysis in cybersecurity, and automated report generation in security incidents.
Frequently Updated Research: Stay informed about advancements in AI for cybersecurity, machine learning algorithms for threat detection, and best practices in security incident response.
Questions about Security Event Detection and Reporting: 1. How does this technology improve upon traditional security event detection methods? 2. What are the key advantages of using AI in security incident response?
Original Abstract Submitted
a computer-implemented method, computer program product and computing system for generating one or more detection rules that are indicative of a security event, wherein the one or more detection rules are based upon historical suspect activity and/or historical security events; monitoring activity within a computing platform, thus defining monitored activity; comparing such monitored activity to the one or more detection rules to determine if such monitored activity includes suspect activity indicative of a security event; generating an initial notification of the security event, wherein the initial notification includes a computer-readable language portion that defines one or more specifics of the security event; and iteratively processing the initial notification using a generative ai model and a formatting script to produce a summarized human-readable report for the initial notification.