US 11,818,155 B2
Cognitive information security using a behavior recognition system
Wesley Kenneth Cobb, The Woodlands, TX (US); Ming-Jung Seow, The Woodlands, TX (US); Curtis Edward Cole, Jr., Spring, TX (US); Cody Shay Falcon, Katy, TX (US); Benjamin A. Konosky, Friendswood, TX (US); Charles Richard Morgan, Katy, TX (US); Aaron Poffenberger, Houston, TX (US); and Thong Toan Nguyen, Richmond, TX (US)
Assigned to Intellective Ai, Inc., Dallas, TX (US)
Filed by Intellective Ai, Inc., Dallas, TX (US)
Filed on Jan. 4, 2022, as Appl. No. 17/568,399.
Application 17/568,399 is a continuation of application No. 16/945,087, filed on Jul. 31, 2020, abandoned.
Application 16/945,087 is a continuation of application No. 15/978,150, filed on May 13, 2018, granted, now 10,735,446, issued on Aug. 4, 2020.
Application 15/978,150 is a continuation of application No. 15/363,871, filed on Nov. 29, 2016, granted, now 9,973,523, issued on May 15, 2018.
Application 15/363,871 is a continuation of application No. 14/457,060, filed on Aug. 11, 2014, granted, now 9,507,768, issued on Nov. 29, 2016.
Claims priority of provisional application 61/864,274, filed on Aug. 9, 2013.
Prior Publication US 2022/0150267 A1, May 12, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06N 20/00 (2019.01); G06F 40/30 (2020.01); G06F 40/226 (2020.01); G06F 40/242 (2020.01); G06F 40/289 (2020.01); G06F 40/40 (2020.01); G06F 40/247 (2020.01); G06F 40/253 (2020.01); G06F 40/284 (2020.01)
CPC H04L 63/1425 (2013.01) [G06F 40/226 (2020.01); G06F 40/242 (2020.01); G06F 40/289 (2020.01); G06F 40/30 (2020.01); G06N 20/00 (2019.01); H04L 63/1408 (2013.01); G06F 40/247 (2020.01); G06F 40/253 (2020.01); G06F 40/284 (2020.01); G06F 40/40 (2020.01)] 18 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, at a processor, a first ordered stream of normalized values associated with information security data for a computer network;
generating a stable neuro-linguistic model by:
clustering the first ordered stream of normalized values to form a plurality of clusters,
outputting an ordered sequence of letters based on the plurality of clusters,
building a dictionary of words based on the ordered sequence of letters, each word from the dictionary of words having a length from a plurality of lengths, each length from the plurality of lengths being less than or equal to a specified maximum letter length,
outputting an ordered stream of words based on the ordered sequence of letters, and
generating a plurality of phrases based on the ordered stream of words;
detecting, using a codelet template, a pattern in a linguistic representation of the information security data, the linguistic representation of the information security data including at least one of the ordered sequence of letters, the ordered stream of words, or the plurality of phrases;
receiving a second ordered stream of normalized values associated with the information security data for the computer network; and
issuing an alert based on the stable neuro-linguistic model, the pattern, and the second ordered stream of normalized values.