US 12,250,243 B2
Systems for network risk assessment including processing of user access rights associated with a network of devices
Miles Seiver, Los Altos Hills, CA (US); and Stephen Cohen, Palo Alto, CA (US)
Assigned to Palantir Technologies Inc., Denver, CO (US)
Filed by Palantir Technologies Inc., Denver, CO (US)
Filed on Aug. 14, 2023, as Appl. No. 18/449,590.
Application 18/449,590 is a continuation of application No. 17/929,272, filed on Sep. 1, 2022, granted, now 11,757,922.
Application 17/929,272 is a continuation of application No. 16/932,341, filed on Jul. 17, 2020, granted, now 11,438,366, issued on Sep. 6, 2022.
Application 16/932,341 is a continuation of application No. 15/981,702, filed on May 16, 2018, granted, now 10,721,263, issued on Jul. 21, 2020.
Application 15/981,702 is a continuation of application No. 15/481,842, filed on Apr. 7, 2017, granted, now 9,985,983, issued on May 29, 2018.
Application 15/481,842 is a continuation of application No. 15/209,434, filed on Jul. 13, 2016, granted, now 9,648,036, issued on May 9, 2017.
Application 15/209,434 is a continuation in part of application No. 14/731,312, filed on Jun. 4, 2015, granted, now 9,467,455, issued on Oct. 11, 2016.
Application 14/731,312 is a continuation of application No. 14/585,043, filed on Dec. 29, 2014, granted, now 9,100,430, issued on Aug. 4, 2015.
Claims priority of provisional application 62/334,918, filed on May 11, 2016.
Claims priority of provisional application 62/272,999, filed on Dec. 30, 2015.
Prior Publication US 2023/0388336 A1, Nov. 30, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/57 (2013.01); H04L 41/0853 (2022.01); H04L 41/0866 (2022.01); H04L 41/12 (2022.01); H04L 43/0876 (2022.01); H04L 43/12 (2022.01); H04L 45/02 (2022.01); H04W 12/08 (2021.01); H04W 84/00 (2009.01); H04L 12/70 (2013.01)
CPC H04L 63/1433 (2013.01) [G06F 21/577 (2013.01); H04L 41/0853 (2013.01); H04L 41/0866 (2013.01); H04L 41/12 (2013.01); H04L 43/0876 (2013.01); H04L 45/02 (2013.01); H04L 63/0236 (2013.01); H04L 63/10 (2013.01); H04L 63/101 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/1466 (2013.01); H04W 12/08 (2013.01); H04W 84/005 (2013.01); H04L 2012/5609 (2013.01); H04L 2012/5623 (2013.01); H04L 43/12 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computerized method comprising:
by a system of one or more computer systems,
accessing a network risk map being applied to a network, the network risk map defining a plurality of compromise values and a plurality of compromise vulnerabilities which are associated with user accounts or network devices, wherein a compromise value indicates an importance an attacker would place on compromising a network device and/or user account, and wherein a compromise vulnerability indicates a likelihood of compromise of the user account and/or network device; and
identifying an external event associated with an effect on the network, wherein the compromise values and/or compromise vulnerabilities are modified based on the external event, and wherein modifying compromise vulnerabilities associated with user accounts compromises identifying that the external event affects particular network devices utilized by a subset of the user accounts and increasing compromise vulnerabilities associated with the subset; and
providing, for presentation via an interactive user interface, information describing the external event.