Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources

a technology for threat modeling and technology resources, applied in the field of system for generation and reuse of resourcecentric threat modeling templates and identifying controls for securing technology resources, can solve problems such as loss types, personal files, account details, and damage to both the entity and the customer involved

Active Publication Date: 2017-11-16
BANK OF AMERICA CORP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a system that helps reduce the risk of accessing internal resources through malicious threats. It does this by monitoring access through different threat vectors and regulating the controls to reduce the exposure score associated with each threat. The system also determines if adding more controls would be cost-effective and recommends them to the user. The user then selects which controls to incorporate. Overall, the system helps minimize risks associated with accessing internal resources.

Problems solved by technology

Breaches in technology resources typically result in these types of losses against customer and client information, payment information, personal files, account details, which can be detrimental to both the entity and the customer involved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources
  • System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources
  • System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to elements throughout. For clarity, non-essential elements may have been omitted from some of the drawing.

[0019]It will be appreciated that certain features of the invention, which are, for clarity, described in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features of the invention, which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable sub-combination or as suitable in any other describ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing resources within a network. The present invention is configured to determine that an internal resource in a network requires protection from unauthorized external access; electronically receive information associated with the internal resource within the network; determine one or more threat vectors associated with the internal resource; electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource; and apply the control template to the internal resource.

Description

BACKGROUND[0001]With the growth in the Internet, securing technology resources has become an integral part of computer and information. Typically, securing technology resources includes measures adopted to avoid loss in the form of confidentiality, integrity, and availability of these resources. Breaches in technology resources typically result in these types of losses against customer and client information, payment information, personal files, account details, which can be detrimental to both the entity and the customer involved. Threat modeling is a systematic approach to ensure that the technology resources are protected against all possible threat vectors.BRIEF SUMMARY[0002]The following presents a simplified summary of one or more embodiments of the present invention, in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/105H04L63/14H04L63/10G06F21/6209G06F21/62G06F21/554G06F21/577H04L63/1408
Inventor YU, SOUNILSLOANE, BRANDON MATTHEW
Owner BANK OF AMERICA CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products