Method and system for processing intelligence information
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-030/02
G06Q-010/10
G06Q-010/06
G06Q-030/06
G06Q-010/08
H04L-012/58
G06Q-050/26
H04L-029/06
출원번호
US-0862994
(2013-04-15)
등록번호
US-10116595
(2018-10-30)
발명자
/ 주소
Malden, Matthew Scott
Israel, Daniel Edward
Pinkerton, Robert Brent
Bishop, Jr., Frank Warren
Patel, Prashant B.
Nash, Christopher Scott
Viswanathan, Rahul
Abichandani, Arun
Yelkur, Rajani
Wong, Hang Yee
Chan, Jackson
출원인 / 주소
Oracle International Corporation
대리인 / 주소
Sheppard Mullin Richter & Hampton LLP
인용정보
피인용 횟수 :
0인용 특허 :
43
초록▼
A method and system for routing intelligence information related to security. The security system provides rules that identify conditions and routing instructions that are to be applied to intelligence information. A security organization may create and modify rules to ensure the appropriate routing
A method and system for routing intelligence information related to security. The security system provides rules that identify conditions and routing instructions that are to be applied to intelligence information. A security organization may create and modify rules to ensure the appropriate routing of intelligence information in a timely manner. The security system may receive intelligence information from various sources. Regardless of the form or source of intelligence information, the security system analyzes the intelligence information to determine whether any conditions of the rules are satisfied. When a condition of a rule is satisfied, the security system sends a notification of the intelligence information in accordance with the routing instructions for that rule. In this way, intelligence information can be automatically and quickly routed to the appropriate security personnel for further processing.
대표청구항▼
1. A method in a computer system for routing intelligence information relating to security, the method comprising: obtaining, by the computer system, a set of rules that each include one or more conditions and corresponding routing instructions, wherein a condition specifies at least a source from w
1. A method in a computer system for routing intelligence information relating to security, the method comprising: obtaining, by the computer system, a set of rules that each include one or more conditions and corresponding routing instructions, wherein a condition specifies at least a source from which a piece of intelligence information was received, and wherein the corresponding routing instructions specify one or more recipients to whom the piece of intelligence information is to be routed;receiving, by the computer system, intelligence information relating to security;analyzing, by the computer system, the intelligence information to identify at least one transformation to be applied to transform the intelligence information into a set of common objects that correspond to a security object model;transforming, by the computer system, the intelligence information to the set of common objects corresponding to the security object model;identifying, by the computer system, at least one alias of at least one suspect referenced in the transformed intelligence information based at least in part on a security database;storing, by the computer system, the transformed intelligence information in the security database, the transformed intelligence information being associated in the security database with the at least one alias of the at least one suspect;analyzing, by the computer system, the transformed intelligence information to determine whether any conditions of the set of rules are satisfied; andwhen a condition of a rule is satisfied, sending a notification describing the intelligence information to a category of agents in accordance with the routing instructions of the rule, wherein the notification includes at least the intelligence information and information referencing the identified suspect. 2. The method of claim 1 wherein the intelligence information is received via an electronic mail message. 3. The method of claim 1 wherein the intelligence information is received via a data entry display page. 4. The method of claim 1 wherein the routing instructions indicate that the intelligence information is to be queued for processing by available security personnel. 5. The method of claim 4 wherein the available security personnel is qualified to process the intelligence information. 6. The method of claim 4 wherein the available security personnel has security to review the intelligence information. 7. The method of claim 1, the method further comprising: determining, by the computer system, that the intelligence information includes a new alias for the at least one suspect referenced in the intelligence information;updating, by the computer system, the security database to associate the new alias with data corresponding to the at least one suspect. 8. A non-transitory computer storage medium storing computer-executable instructions that, when executed, cause a computer system to perform a computer-implemented method comprising: obtaining a set of rules that each include one or more conditions and corresponding routing instructions, wherein a condition specifies at least a source from which a piece of intelligence information was received, and wherein the corresponding routing instructions specify one or more recipients to whom the piece of intelligence information is to be routed,receiving intelligence information relating to security,analyzing the intelligence information to identify at least one transformation to be applied to transform the intelligence information into a set of common objects that correspond to a security object model;transforming the intelligence information to the set of common objects corresponding to the security object model;identifying at least one alias of at least one suspect referenced in the transformed intelligence information based at least in part on a security database;storing the transformed intelligence information in the security database, the transformed intelligence information being associated in the security database with the at least one alias of the at least one suspect;analyzing the transformed intelligence information to determine whether any conditions of the set of rules are satisfied, andwhen a condition of a rule is satisfied, sending a notification describing the intelligence information to a category of agents in accordance with the routing instructions of the rule, wherein the notification includes at least the intelligence information and information referencing the identified suspect. 9. The computer program product of claim 8, wherein the intelligence information is received via an electronic mail message. 10. The computer program product of claim 8, wherein the intelligence information is received via a data entry display page. 11. The computer program product of claim 8, wherein the routing instructions indicate that the intelligence information is to be queued for processing by available security personnel. 12. The computer program product of claim 11, wherein the available security personnel is qualified to process the intelligence information. 13. The computer program product of claim 11, wherein the available security personnel has security to review the intelligence information. 14. A computer system comprising: a processor;a computer-readable storage medium coupled to the processor; anda plurality of instructions, encoded in the computer-readable storage medium and configured to cause the processor to obtain a set of rules that each include one or more conditions and corresponding routing instructions, wherein a condition specifies at least a source from which a piece of intelligence information was received, and wherein the corresponding routing instructions specify one or more recipients to whom the piece of intelligence information is to be routed,receive intelligence information relating to security,analyze the intelligence information to identify at least one transformation to be applied to transform the intelligence information into a set of common objects that correspond to a security object model;transform the intelligence information to the set of common objects corresponding to the security object model;identify at least one alias of at least one suspect referenced in the transformed intelligence information based at least in part on a security database;store the transformed intelligence information in the security database, the transformed intelligence information being associated in the security database with the at least one alias of the at least one suspect;analyze the transformed intelligence information to determine whether any conditions of the set of rules are satisfied, andsend a notification describing the intelligence information to a category of agents in accordance with the routing instructions of the provided rule, when a condition of a rule is satisfied, wherein the notification includes at least the intelligence information and information referencing the identified suspect. 15. The computer system of claim 14, wherein the routing instructions indicate that the intelligence information is to be queued for processing by available security personnel.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (43)
Amirghodsi Siamak (Prairie View IL) Daneshbodi Farnoud (Prairie View IL), Adaptive natural language computer interface system.
Srinivasan Seshan R. (1524 Condor Way Sunnyvale CA 94087), Automated, electronic network based, project management server system, for managing multiple work-groups.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
Layton, Pamela G.; Crawford, Keith D.; Gadboys, Jeffrey A.; Jacobs, Jack H., Information management network for automated delivery of alarm notifications and other information.
Fox, Mark A.; King, Peter F.; Ramasubramani, Seetharaman; Martin, Jr., Bruce K.; Boyle, Stephen S., Method and apparatus for informing wireless clients about updated information.
Beck Christopher Clemmett Macleod ; Berke Jonathan Michael ; Johnstone Joel A. ; Mitchell Robin Marie ; Powers James Karl ; Sidell Mark Franklin ; Knuff Charles Dazler, Operating system having external media layer, workflow layer, internal media layer, and knowledge base for routing media events between transactions.
Theimer Marvin M. (Mountain View CA) Spreitzer Michael J. (Tracy CA) Weiser Mark D. (Palo Alto CA) Goldstein Richard J. (San Francisco CA) Terry Douglas B. (San Carlos CA) Schilit William N. (Palo Al, Selective delivery of electronic messages in a multiple computer system based on context and environment of a user.
Govrin, David; Peer, Boaz; Sosna, David; Greenberg, Guy, System and method for analyzing and utilizing data, by executing complex analytical models in real time.
Sarpy, Sr., Russel William; Fortune, Wesley Trenton; Fortune, Jr., Robert Lee, System and method for facilitating the execution of law enforcement duties and enhancing anti-terrorism and counter-terrorism capabilities.
Shaheen Amal A. (Austin TX) Yellepeddy Krishna K. (Austin TX), System and method for maintaining replicated data coherency in a data processing system.
Eisenberg Neal R. (San Jose CA) Huddleston Robert L. (Sunnyvale CA) Karasiuk Gary R. (Keswick CA CAX) Lehner Mary C. (San Jose CA) Tribolet Charles S. (Morgan Hill CA), Variant domains and variant maps in a versioned database management system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.