US 11,995,206 B2
Data breach detection and mitigation
Alan James Sharp-Paul, Los Altos, CA (US); Christopher Robert Vickery, Santa Rosa, CA (US); Jonathan David Hendren, Mountain View, CA (US); Gregory Ford Pollock, San Jose, CA (US); Daniel Bradbury, Sydney (AU); Christian Alan Kiely, Sydney (AU); Gavin Richard Turner, Holgate (AU); and Michael Franz Baukes, Hobart (AU)
Assigned to UPGUARD, INC., Mountain View, CA (US)
Filed by UpGuard, Inc., Mountain View, CA (US)
Filed on Mar. 7, 2023, as Appl. No. 18/179,376.
Application 18/179,376 is a continuation of application No. 17/231,819, filed on Apr. 15, 2021, granted, now 11,630,911.
Application 17/231,819 is a continuation of application No. 16/254,605, filed on Jan. 23, 2019, granted, now 11,023,610, issued on Jun. 1, 2021.
Prior Publication US 2023/0205911 A1, Jun. 29, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 16/22 (2019.01); G06F 16/2457 (2019.01); G06F 21/60 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/6218 (2013.01) [G06F 16/22 (2019.01); G06F 16/24578 (2019.01); G06F 21/604 (2013.01); H04L 63/0823 (2013.01); H04L 63/083 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
querying, by a computer, one or more data sources using keywords indicative of potential breaches to produce query results;
identifying, by the computer, a candidate breach based at least in part on query results associated with characteristics of a system;
computing, by the computer, a likelihood that the candidate breach is an actual breach based on the query results and a set of breach criteria weights; and
in response to the computed likelihood exceeding a breach threshold, identifying, by the computer, a network node associated with the candidate breach for isolation.