US 12,316,680 B2
Integrated security and threat prevention and detection platform
Peter J. Seeber, Davidson, NC (US); Michael B. Viruso, Davidson, NC (US); and Richard D. Ingersoll, Raleigh, NC (US)
Assigned to CORVID CYBERDEFENSE LLC, Mooresville, NC (US)
Filed by CORVID CYBERDEFENSE LLC, Mooresville, NC (US)
Filed on Jul. 10, 2023, as Appl. No. 18/349,226.
Application 18/349,226 is a continuation of application No. 16/458,913, filed on Jul. 1, 2019, granted, now 11,700,279.
Claims priority of provisional application 62/692,283, filed on Jun. 29, 2018.
Prior Publication US 2024/0129342 A1, Apr. 18, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/57 (2013.01)
CPC H04L 63/20 (2013.01) [G06F 21/577 (2013.01); H04L 63/1408 (2013.01); H04L 63/1441 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, at a central processor, first network security data from at least one first network security application configured to monitor a first network communication layer in a computer network, wherein the first network communication layer is one of a physical layer, a data link layer, a network layer, a transport layer, a session layer, a presentation layer, or an application layer, and second network security data from at least one second network security application configured to monitor a second network communication layer in the computer network, wherein the second network communication layer is a different one of the physical layer, the data link layer, the network layer, the transport layer, the session layer, the presentation layer, and the application layer, wherein the first network security data comprises network usage data, network threats data, application usage data, threat mitigation data, malware activity data, virus activity data, or combinations thereof, and wherein the second network security data comprises network usage data, network threats data, application usage data, threat mitigation data, malware activity data, virus activity data, or combinations thereof;
aggregating and weighting, by the central processor, the first and second network security data, resulting in weighted aggregated data; and
providing, by the central processor, an integrated dashboard presentation that includes both a timeline view of threats found in the computer network and a single indication of an overall risk level in the computer network, including at the first network communication layer and at the second network communication layer, the overall risk level determined based on the weighted aggregated data.