US 12,244,628 B2
Intelligent and proactive device vulnerability detection and protection
Preeti Agarwal, Cupertino, CA (US); and William J. McFarland, Portola Valley, CA (US)
Assigned to PLUME DESIGN, INC., Palo Alto, CA (US)
Filed by Plume Design, Inc., Palo Alto, CA (US)
Filed on May 24, 2022, as Appl. No. 17/752,252.
Prior Publication US 2023/0388329 A1, Nov. 30, 2023
Int. Cl. H04L 9/40 (2022.01); G06N 5/04 (2023.01)
CPC H04L 63/1433 (2013.01) [G06N 5/04 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A non-transitory computer-readable storage medium having computer readable code stored thereon for programming a computer to perform steps of:
determining attack threats for devices based on predictive analysis;
assigning priority to attack spheres responsive to determining the attack threats to the devices within the attack sphere;
scanning the devices based on the assigned priority, the devices in an identified priority attack sphere are one or more of scanned before other devices, scanned more frequently, and scanned at an increased level.