-
公开(公告)号:US20170163654A1
公开(公告)日:2017-06-08
申请号:US15394170
申请日:2016-12-29
Applicant: T-Mobile, U.S.A., Inc.
Inventor: Brett Peppe , Greg Reith
IPC: H04L29/06
CPC classification number: H04L63/105 , G06F21/606 , G06F21/6218 , G06F21/6245 , G06F2221/2113 , H04L63/101 , H04L63/102
Abstract: A system and method of providing a secure data corridor are provided. A request from a subject for at least one data element of a data feed is received. A use-case is identified for the data feed. A security label is assigned to the use-case. A clearance of the subject is compared to the security label of the use-case. Upon determining that a clearance of the subject is at or above the data sensitivity rating of the use-case, the subject is allowed access privilege to the data feed via the secure data corridor.
-
公开(公告)号:US20180219914A1
公开(公告)日:2018-08-02
申请号:US15417548
申请日:2017-01-27
Applicant: T-Mobile, U.S.A. Inc.
Inventor: Greg Reith , Brett Peppe
IPC: H04L29/06
CPC classification number: H04L63/20 , G06N7/005 , G06N20/00 , H04L63/104 , H04L63/1425 , H04W12/00508 , H04W12/08
Abstract: A methods and systems of providing security based on an identified susceptibility profile of a user are provided. Behavioral data related to an account of a user is received for a predetermined period. The behavioral data is analyzed for a pattern of on-line behavior of the user. A susceptibility profile of the user is created based on the pattern of on-line behavior. Environment parameters are received from a database. A security threat model is created based on the susceptibility profile and the environment parameters. A report data packet based on the created threat model is sent to an account of the user.
-
公开(公告)号:US20170163652A1
公开(公告)日:2017-06-08
申请号:US15394148
申请日:2016-12-29
Applicant: T-Mobile, U.S.A. Inc.
Inventor: Brett Peppe , Greg Reith
CPC classification number: H04L63/102 , G06F21/606 , G06F21/6218 , G06F21/6245 , G06F2221/2113 , H04L63/101 , H04L63/105
Abstract: A system and method of providing a secure data corridor are provided. A request is received from a subject for a data feed comprising one or more data elements. A use-case is identified and a security level is determined for the data feed. For each data element of the data feed, a security level and one or more security controls that are mapped to the corresponding data element, are determined. A data sensitivity rating is assigned to the use-case. Upon determining that a clearance of the subject is at or above the data sensitivity rating of the use-case, the subject is granted privilege to the data feed via the secure data corridor.
-
-