Invention Grant
- Patent Title: System and method for detecting a compromised computing system
- Patent Title (中): 用于检测受损计算系统的系统和方法
-
Application No.: US14490543Application Date: 2014-09-18
-
Publication No.: US09350707B2Publication Date: 2016-05-24
- Inventor: John S. Flowers , Ridgely C. Evers
- Applicant: TRUSTPIPE LLC
- Applicant Address: US CA Healdsburg
- Assignee: TRUSTPIPE LLC
- Current Assignee: TRUSTPIPE LLC
- Current Assignee Address: US CA Healdsburg
- Agency: Morrison & Foerster LLP
- Main IPC: G06F15/173
- IPC: G06F15/173 ; H04L29/06 ; H04L12/801 ; H04L29/12

Abstract:
A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.
Public/Granted literature
- US20150020187A1 SYSTEM AND METHOD FOR DETECTING A COMPROMISED COMPUTING SYSTEM Public/Granted day:2015-01-15
Information query