发明名称 Computer security threat data collection and aggregation with user privacy protection
摘要 An endpoint computer in an enterprise network is configured to detect computer security threat events, such as presence of a computer virus. Upon detection of a threat event, the endpoint computer generates computer security threat data for the threat event. The threat data may include user identifiable data that can be used to identify a user in the enterprise network. The endpoint computer encrypts the user identifiable data prior to sending the threat data to a smart protection network or to an enterprise server where threat data from various enterprise networks are collected for analysis. The endpoint computer may also encrypt an identifier for the threat data and provide the encrypted identifier to the smart protection network and to an enterprise server in the enterprise network. The enterprise server may use the encrypted identifier to retrieve the threat data from the smart protection network to generate user-specific reports.
申请公布号 US9043587(B1) 申请公布日期 2015.05.26
申请号 US201213542445 申请日期 2012.07.05
申请人 Trend Micro Incorporated 发明人 Chen Yi-Fen;Liu Shuosen Robert
分类号 H04L29/06;G06F21/55 主分类号 H04L29/06
代理机构 Okamoto & Benedicto LLP 代理人 Okamoto & Benedicto LLP
主权项 1. A computer-implement method of collecting computer security threat data, the method comprising: detecting a first computer security threat event at a first computer in a first computer network; generating a first computer security threat data based on the first computer security threat event, the first computer security threat data including a first user identifiable data that can be used to identify a first user of the first computer in the first computer network and a first non-user identifiable data relating to the first computer security threat event; encrypting the first user identifiable data to generate a first encrypted user identifiable data; forwarding the first computer security threat data that includes the first encrypted user identifiable data from the first computer to a first server computer that cannot decrypt the first encrypted user identifiable data over the Internet; detecting a second computer security threat event at a second computer in a second computer network that is different from the first computer network; generating a second computer security threat data based on the second computer security threat event, the second computer security threat data including a second user identifiable data that can be used to identify a second user in the second computer network and a second non-user identifiable data relating to the second computer security threat event; encrypting the second user identifiable data to generate a second encrypted user identifiable data; forwarding the second computer security threat data that includes the second encrypted user identifiable data from the second computer to the first server computer that cannot decrypt the second encrypted user identifiable data over the Internet, the first server computer being in a third computer network that is different from the first and second computer networks; and aggregating in the first server computer the first computer security threat data and the second computer security threat data to identify a common computer security threat in the first and second computer networks, wherein the common computer security threat is a computer security threat that is present in the first computer network and in the second computer security network.
地址 Tokyo JP