US 12,284,198 B2
Threat control method and system
Dmitriy Komashinskiy, Helsinki (FI); and Paolo Palumbo, Helsinki (FI)
Assigned to WITHSECURE CORPORATION, Helsinki (FI)
Filed by WithSecure Corporation, Helsinki (FI)
Filed on Sep. 29, 2022, as Appl. No. 17/956,470.
Claims priority of application No. 21199717 (EP), filed on Sep. 29, 2021.
Prior Publication US 2023/0097370 A1, Mar. 30, 2023
Int. Cl. H04L 9/40 (2022.01); G06F 21/55 (2013.01)
CPC H04L 63/1425 (2013.01) [G06F 21/552 (2013.01); G06F 21/554 (2013.01); H04L 63/1416 (2013.01); H04L 63/1441 (2013.01); H04L 63/1475 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of threat detection in a computer network, the method comprising:
detecting, by a first node, a security threat at the first node;
collecting context information at the first node relating to the detected security threat;
reporting at least one detected security threat and the collected context information to at least a second node;
analyzing, at the second node, the received information relating to the security threat and collecting context information relating to the analysis at the second node; and
sending the threat related information with added analysis and context information collected from the second node to at least one further node or backend,
wherein the first node, the second node, and the at least one further node are computers, smartphones, tablets, or laptops.