US 12,294,605 B2
Providing identity protection
Karen Jiang, Edison, NJ (US); Jayleen Patricia Li, Sunnyvale, CA (US); Insiya Gunja, Cupertino, CA (US); and Autumn Nguyen, Westminster, CA (US)
Assigned to Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed by Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed on Nov. 7, 2022, as Appl. No. 17/982,272.
Prior Publication US 2024/0154986 A1, May 9, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 63/102 (2013.01); H04L 63/1425 (2013.01); H04L 63/20 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A system, comprising:
a processor configured to:
monitor a plurality of sites;
extract predetermined user information for a user from the plurality of monitored sites to generate a profile of the user;
analyze, using a model, the profile of the user to detect whether one or more security vulnerabilities exist for social engineering attacks for one or more enterprise resources associated with the user, comprising to:
identify relationships between the profile and enterprise resources;
determine, using the model, similarities to known security vulnerabilities based on the relationships, wherein the model utilizes a machine learning technique, wherein the model is trained using a set of known security vulnerabilities; and
determine whether a security vulnerability to an enterprise resource exists based on the similarities; and
perform an action in response to the one or more detected security vulnerabilities based on a policy; and
a memory coupled to the processor and configured to the processor with instructions.