System for authorizing secured access using cryptographic hash value validations

    公开(公告)号:US11539528B2

    公开(公告)日:2022-12-27

    申请号:US16806420

    申请日:2020-03-02

    Abstract: A system for authorizing secured access using cryptographic hash value validations is provided. In particular, the system may receive requests from users and/or computing systems to obtain secured access a particular resource or to execute a certain process. In response, the system may require that the user and/or computing system complete additional required steps (e.g., a computation) before being granted access to the resources or processes. In this way, the system may prevent unauthorized or unintended access to the system's resources or processes.

    SYSTEM FOR IMPLEMENTING STEGANOGRAPHY-BASED AUGMENTED REALITY PLATFORM

    公开(公告)号:US20220398812A1

    公开(公告)日:2022-12-15

    申请号:US17344037

    申请日:2021-06-10

    Inventor: Brandon Sloane

    Abstract: Systems, computer program products, and methods are described herein for implementing steganography based augmented reality platform. The present invention is configured to provide an augmented reality application for installation on a computing device of a user; receive, via the augmented reality application, a real-time visual feed, wherein the real-time visual feed comprises an image, wherein the image comprises a message that is steganographically embedded therein; determine that the computing device of the user is authorized to access the message embedded in the image in the visual feed; and generate an acknowledgement that the computing device of the user is authorized to access the message embedded in the image in the visual feed; and transmit control signals configured to cause the computing device of the user to overlay, via the augmented reality application, the acknowledgement in a vicinity of the image in the real-time visual feed.

    SYSTEM FOR QUANTIFICATION OF CYBERSECURITY MODULE EFFICACY USING Q-MATRIX BASED CORRELATION ANALYSIS

    公开(公告)号:US20220398323A1

    公开(公告)日:2022-12-15

    申请号:US17342870

    申请日:2021-06-09

    Abstract: A system is provided for quantification of cybersecurity module efficacy using Q-matrix based correlation analysis. In particular, the system may use Q-matrices to calculate adaptive correlation scores between cybersecurity module and expected and/or desired outcomes across one or more different dimensions. A first axis of the Q-matrix for a particular cybersecurity module may be populated with one or more key elements of the cybersecurity module, while a second axis of the Q-matrix may comprise the outputs or metrics that may be used to quantify the efficacy of the cybersecurity module with respect to the key elements as represented on the first axis. The correlation scores may then be used as inputs into a decisioning engine that may be used to drive entity-wide decisioning processes based on the outputs of the Q-matrix based analysis.

    ROUTING A DATA PROCESSING TRANSACTION BASED ON MACHINE LEARNING

    公开(公告)号:US20220391720A1

    公开(公告)日:2022-12-08

    申请号:US17339686

    申请日:2021-06-04

    Abstract: According to certain embodiments, a routing system comprises a memory operable to store historical data associated with a plurality of previous data processing transactions and a processor operably coupled to a network interface and the memory. The processor is configured to obtain the historical data associated with the plurality of previous data processing transactions transacted using a first routing between a first computing system and a second computing system and determine a pattern based on the historical data, the pattern determined based on machine learning. The processor is further configured to associate the pattern with a second routing between the first computing system and the second computing system, determine an upcoming data processing transaction corresponding to the pattern, and use the second routing to transact the upcoming data processing transaction.

    SYSTEMS AND METHODS PROVIDING STREAMLINED DATA CORRELATION IN EDGE COMPUTING

    公开(公告)号:US20220358148A1

    公开(公告)日:2022-11-10

    申请号:US17315583

    申请日:2021-05-10

    Abstract: Embodiments of the present invention provide a system for analyzing and correlating layered electronic data logs for monitored events on a network. The system is configured for identifying one or more entity resources associated with an entity, continuously monitoring the one or more entity resources, identifying at least a first event and a second event associated with at least one entity resource of the one or more entity resources, and performing a correlation analysis at the entity resource prior to transferring the data to a centralized data lake. In this way, the system streamlines the process for correlative analysis by performing resource heavy analysis at the edge of the network and later consolidating such data for further review.

    SYSTEM FOR DYNAMIC EXPOSURE MONITORING

    公开(公告)号:US20220309174A1

    公开(公告)日:2022-09-29

    申请号:US17210729

    申请日:2021-03-24

    Abstract: Systems, computer program products, and methods are described herein for dynamic exposure monitoring. The present invention is configured to determine a resource associated with a network environment, wherein the resource is associated with an exposure portfolio; determine one or more monitoring requirements associated with the resource, wherein the one or more monitoring requirements are determined based on the exposure portfolio; implement a first subset of one or more resource monitoring tools based on at least the one or more monitoring requirements of the resource; determine a change in the exposure portfolio of the resource; determine a change in the one or more monitoring requirements based on at least the change in the exposure portfolio of the resource; trigger a dynamic modification to the one or more resource monitoring tools; and implement the second subset of the one or more resource monitoring tools on the resource.

    System for computing system configuration file state mirroring on peer computing devices

    公开(公告)号:US11307952B1

    公开(公告)日:2022-04-19

    申请号:US17246170

    申请日:2021-04-30

    Inventor: Brandon Sloane

    Abstract: A system is provided for computing system configuration file state mirroring on peer computing devices. In particular, the system may identify and select a computing device containing a configuration file to be protected by the system. The system may then store various portions of the configuration file across a plurality of trusted peer computing devices. Once the baseline values for the configuration file have been established, the system may, upon detecting any unintentional or unauthorized changes to the configuration file, initiate a reconstruction process to restore the configuration file to its baseline values. In this way, the system provides a way to maintain the integrity of protected configuration files of computing devices within the network.

    DIGITAL PASSPORT WITH VERIFIED DATA PROVENANCE

    公开(公告)号:US20220109960A1

    公开(公告)日:2022-04-07

    申请号:US17552387

    申请日:2021-12-16

    Abstract: Systems and methods for accurately and securely assembling, storing, and leveraging travel data are provided. A method may include detecting a travel event of a user. The method may include recording the travel event in a travel map that is stored in a database. The travel map may be a temporal- and spatial-based record of one or more travel events of the user. The travel map may be stored as a blockchain ledger. The method may include tokenizing sensitive information associated with the user in the database, and calculating a hazard vector. The method may include updating, based at least in part on the hazard vector, a status index associated with the user, and providing the user and a system administrator access to the travel map and the status index. Access may be provided via an online portal configured to be viewed via an application running on a mobile device.

    Network security system for rogue devices

    公开(公告)号:US11271919B2

    公开(公告)日:2022-03-08

    申请号:US16890564

    申请日:2020-06-02

    Abstract: A security system that provides for secure communication between systems on a network without the need for encrypting the packets related to the communication, and thus, provides secure communications over the network without the processing capacity, memory, and/or processing delays caused by encryption of the packets. The disclosure aids in preventing rogue systems from being able to read communications over the network without the need for encryption. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets.

    SYSTEM FOR CONTROLLING COMPUTING PROCESS EXECUTION BY USERS WITH ELEVATED ACCESS PRIVILEGE

    公开(公告)号:US20210390193A1

    公开(公告)日:2021-12-16

    申请号:US16898625

    申请日:2020-06-11

    Inventor: Brandon Sloane

    Abstract: A system is provided for controlling computing process execution by users with elevated access privilege. In particular, the system may be configured to hook into the process command loop for a computing system within the network environment to monitor the users logged into the system as well as computing processes being executed. The system may further flag the users and processes according to their type. If the system detects a mismatch between the user and the process, the system may automatically suspend the process from being executed. In this way, the system may ensure that processes are executed only by their authorized users.

Patent Agency Ranking