US 12,483,600 B2
System and method for utilization of threat data for network security
David Dubois, Erie, CO (US); Michael Benjamin, Broomfield, CO (US); Mark Dehus, Thornton, CO (US); and Peter Brecl, Highlands Ranch, CO (US)
Assigned to Level 3 Communications, LLC, Denver, CO (US)
Filed by Level 3 Communications, LLC, Denver, CO (US)
Filed on Jun. 13, 2024, as Appl. No. 18/742,372.
Application 18/742,372 is a continuation of application No. 16/845,799, filed on Apr. 10, 2020, granted, now 12,015,644.
Claims priority of provisional application 62/979,378, filed on Feb. 20, 2020.
Claims priority of provisional application 62/979,376, filed on Feb. 20, 2020.
Claims priority of provisional application 62/832,773, filed on Apr. 11, 2019.
Prior Publication US 2024/0340318 A1, Oct. 10, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G08B 21/18 (2006.01)
CPC H04L 63/20 (2013.01) [G08B 21/18 (2013.01); H04L 63/0263 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method for providing security services from a telecommunications network, the method comprising:
generating, at a computing device, a security infrastructure profile comprising a first network security device of a first network and a second network security device of a second network;
receiving, at the computing device, threat intelligence data comprising identification of a source computing device associated with a network threat and a risk score associated with communications originating from the source computing device;
transmitting, based on a comparison of the risk score of the threat intelligence data to a risk threshold value of a security trigger, information to configure the first network security device of the first network and the second network security device of the second network to apply a security policy to communications originating from the source computing device associated with the network threat;
providing, via a user interface, an interactive alert associated with the comparison of the risk score of the data to the risk threshold value of the security trigger; and
receiving, via the user interface and through the interactive alert, an authorization to transmit the information to configure the first network security device of the first network and the second network security device of the second network.