EXPOSURE BASED SECURE ACCESS SYSTEM
    11.
    发明申请

    公开(公告)号:US20200065811A1

    公开(公告)日:2020-02-27

    申请号:US16107386

    申请日:2018-08-21

    Abstract: Systems, computer program products, and methods are described herein for regulating exposure based secured access is presented. The present invention is configured to receive, from a user computing device, a request to access a network device to execute one or more actions, wherein the user computing device is associated with a payment token; receive information associated with the one or more actions, wherein the information comprises an exposure level; initiate an authorization module associated with the distributed network environment; determine, using the authorization module, a token amount to execute the one or more actions; automatically retrieve, from the user computing device, the token amount from the payment token; authorize the user computing device to access the network device to execute the one or more actions; and access and update a blockchain distributed ledger based on information associated with the request and subsequent authorization to access the network device.

    INDICATOR REGRESSION AND MODELING FOR IMPLEMENTING SYSTEM CHANGES TO IMPROVE CONTROL EFFECTIVENESS

    公开(公告)号:US20190065178A1

    公开(公告)日:2019-02-28

    申请号:US15688253

    申请日:2017-08-28

    CPC classification number: G06F8/71 G06Q10/04 H04L41/0893

    Abstract: Embodiments of the present invention provide a system for indicator regression and modeling for implementing system changes to improve control effectiveness. The system is typically configured for presenting, prompting for and receiving a selection from a list of controls from a user, via a control effectiveness application user interface on a user device. The system is also for receiving two or more consideration indicators from the user device, via the control effectiveness application user interface forming a consideration set; applying a regression algorithm on the consideration set of indicators; reducing a number of the subset of the consideration set of indicators based on a threshold correlation or a threshold number; finalizing the final equation with the number of the subset, each having a corresponding coefficient; and, in response to finalizing the final equation, automatically performing an action configured to improve effectiveness of the control based on the final equation.

    Secure access control framework using dynamic resource replication

    公开(公告)号:US11983254B2

    公开(公告)日:2024-05-14

    申请号:US18228709

    申请日:2023-08-01

    CPC classification number: G06F21/31 G06F9/5005 G06N20/00 G06F2221/2123

    Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.

    SECURE ACCESS CONTROL FRAMEWORK USING DYNAMIC RESOURCE REPLICATION

    公开(公告)号:US20230376578A1

    公开(公告)日:2023-11-23

    申请号:US18228709

    申请日:2023-08-01

    CPC classification number: G06F21/31 G06N20/00 G06F9/5005 G06F2221/2123

    Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.

    System for generating distributed cloud data storage on disparate devices

    公开(公告)号:US10812590B2

    公开(公告)日:2020-10-20

    申请号:US15816848

    申请日:2017-11-17

    Abstract: A system is configured to allocate storage space on existing devices within the entity's networked system to create cloud storage space. In particular, unallocated space on computing devices, typically user devices, within an entity's network is utilized as a cloud data repository. Cloud data is indexed, divided into chunks, encrypted, and stored on numerous disparate endpoint devices connected to the network. Copies of cloud chunk data may be duplicated across multiple endpoint devices to allow for data redundancy, thereby ensuring cloud data uptime according to the availability needs of the entity. Cloud data may further be allocated to different devices based on regional data restrictions. In this way, the system provides an efficient and secure way to generate an internal cloud data storage repository within an entity's networked system.

Patent Agency Ranking