US 12,425,427 B2
Method and system for online user security information event management
Limor Grossman-Avraham, Moshav Hosen (IL)
Assigned to CELESTYA LTD., Tefen Tower Industrial Area (IL)
Filed by CELESTYA LTD., Tefen Tower Industrial Area (IL)
Filed on Aug. 19, 2022, as Appl. No. 17/891,794.
Application 17/891,794 is a continuation in part of application No. PCT/IB2021/051474, filed on Feb. 22, 2021.
Claims priority of provisional application 62/978,852, filed on Feb. 20, 2020.
Prior Publication US 2022/0394052 A1, Dec. 8, 2022
Int. Cl. H04L 9/40 (2022.01); G06F 11/34 (2006.01); G06F 21/50 (2013.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01)
CPC H04L 63/1425 (2013.01) [H04L 63/1416 (2013.01); H04L 63/20 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A computing system comprising:
at least one processor; and
at least one memory communicatively coupled to the at least one processor comprising computer-readable instructions that when executed by the at least one processor cause the computing system to implement a method of predicting a security risk by a user, the method comprising:
(i) receiving by the system a plurality of security policy rules, each rule comprising a condition indicative of a security violation and a corresponding remedial action to be applied to a user violating said condition;
(ii) receiving by the system a plurality of security events, each event comprising user profile data and event-related data;
(iii) applying a machine learning model trained on the user security events data to generate, for each user, a user specific profile associating that user with one or more risk probability for violating a security policy rule;
(iv) receiving a user profile and a security policy rule and based on the model determining a risk probability that the user will violate said security policy rule; and
(v) if said risk probability is above a predetermined value, recommending taking a preventive action with the user.