US 11,811,796 B2
Indicator of compromise calculation system
Ismael Navarro, Redmond, WA (US)
Assigned to T-Mobile USA, Inc., Bellevue, WA (US)
Filed by T-Mobile USA, Inc., Bellevue, WA (US)
Filed on Mar. 10, 2022, as Appl. No. 17/691,968.
Application 17/691,968 is a continuation of application No. 15/876,822, filed on Jan. 22, 2018, granted, now 11,310,245.
Prior Publication US 2022/0201019 A1, Jun. 23, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/55 (2013.01); G06F 16/907 (2019.01)
CPC H04L 63/1416 (2013.01) [G06F 16/907 (2019.01); G06F 21/55 (2013.01); H04L 63/1433 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
under control of one or more processors:
receiving, from a computing device operating on a telecommunications network, Indicator of Compromise (IoC) metadata derived from a client interaction at the computing device via the telecommunications network, the client interaction involving at least one of a change to a systems configuration file or a bypass of a communications channel;
analyzing the IoC metadata to identify data patterns between the IoC metadata and one or more malicious threats;
identifying at least one malicious threat from the one or more malicious threats, based at least in part on analysis of the IoC metadata;
retrieving, from a third-party data repository, a data record associated with the at least one malicious threat, the data record including a point-in-time that the at least one malicious threat was reported active;
performing a mitigation analysis of environmental criteria of the computing device that mitigate an effect of the at least one malicious threat on the computing device using the data record;
determining a vulnerability score that is associated with the at least one malicious threat, wherein the vulnerability score is determined to numerically combine a severity of the at least one malicious threat and mitigating environmental criteria;
determining a time-period for which the at least one malicious threat is to remain active after the point-in-time, wherein the time-period remains undefined for the at least one malicious threat that is difficult to mitigate, quarantine, or protect against; and
generating reporting data that includes at least the vulnerability score associated with the IoC metadata.