Patents Assigned to Tizor Systems, Inc.
  • Patent number: 7870598
    Abstract: This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.
    Type: Grant
    Filed: August 18, 2008
    Date of Patent: January 11, 2011
    Assignee: Tizor Systems, Inc.
    Inventors: Pratyush Moghe, Narain Gehani
  • Patent number: 7673147
    Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, network re-routing, or the like) is then implemented.
    Type: Grant
    Filed: September 24, 2004
    Date of Patent: March 2, 2010
    Assignee: Tizor Systems, Inc.
    Inventors: Pratyush Moghe, Peter T. Smith
  • Publication number: 20080307493
    Abstract: This disclosure provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, de-provision, or the like) is then implemented.
    Type: Application
    Filed: August 18, 2008
    Publication date: December 11, 2008
    Applicant: TIZOR SYSTEMS, INC.
    Inventors: Pratyush Moghe, Narain Gehani
  • Patent number: 7415719
    Abstract: The present invention provides a policy specification framework to enable an enterprise to specify a given insider attack using a holistic view of a given data access, as well as the means to specify and implement one or more intrusion mitigation methods in response to the detection of such an attack. The policy specification provides for the use of “anomaly” and “signature” attributes that capture sophisticated behavioral characteristics of illegitimate data access. When the attack occurs, a previously-defined administrator (or system-defined) mitigation response (e.g., verification, disconnect, deprovision, or the like) is then implemented.
    Type: Grant
    Filed: September 24, 2004
    Date of Patent: August 19, 2008
    Assignee: Tizor Systems, Inc.
    Inventors: Pratyush Moghe, Narain Gehani