US 11,997,125 B2
Automated actions in a security platform
Anurag Gurtu, Fremont, CA (US); and Yasir Khalid, Fremont, CA (US)
Assigned to STRIKEREADY INC., Fremont, CA (US)
Filed by STRIKEREADY, Fremont, CA (US)
Filed on Aug. 10, 2020, as Appl. No. 16/989,632.
Claims priority of provisional application 62/980,519, filed on Feb. 24, 2020.
Prior Publication US 2021/0266341 A1, Aug. 26, 2021
Int. Cl. H04L 29/06 (2006.01); G06N 5/025 (2023.01); H04L 9/40 (2022.01); H04L 67/50 (2022.01)
CPC H04L 63/1433 (2013.01) [G06N 5/025 (2013.01); H04L 63/102 (2013.01); H04L 67/535 (2022.05)] 16 Claims
OG exemplary drawing
 
1. A computer-implemented method for providing automated actions in handling security threats, the method comprising:
receiving input data comprising one or more entities and one or more intents;
extracting the entities and the intents from the input data;
traversing a data structure to determine whether there exists a connection between the extracted entities and the extracted intents, wherein the connection automatically triggers invocation of at least one specific action; and
in response to determining that there exists a connection between the extracted entities and the extracted intents, invoking the at least one specific action comprising:
presenting a plurality of available security actions to a user to resolve one or more security threats associated with the input data when there exists at least one actionable entity from the extracted entities, the available security actions being respectively selectable by the user;
presenting to the user respective confidence scores associated with the plurality of available security actions, wherein the confidence scores correspond with a range of security actions among the plurality of available security actions ranging from a mostly selected security action to a least selected security action;
in response to selecting an available security action by the user, automating a performance of the selected security action, without the user's input, to resolve the one or more security threats; and
dynamically updating the presented available security actions.