Model framework and system for cyber security services

    公开(公告)号:US10003598B2

    公开(公告)日:2018-06-19

    申请号:US15099654

    申请日:2016-04-15

    CPC classification number: H04L63/10 H04L63/1416

    Abstract: Systems, computer program products, and methods are described herein for a model framework and system for cyber security services. The present invention is configured to determine one or more access paths to the internal computing device from an external computing device; determine one or more controls associated with each access path; determine one or more types of access that may be made via one or more of the access paths by the external computing device to access the internal computing device; determine whether the one or more controls associated with the at least one of the one or more access paths is capable of detecting the access; determine one or more tools configured to regulate the one or more controls; and incorporate the one or more tools within the network to regulate the one or more controls to detect and monitor the access.

    SYSTEMS AND METHODS FOR DATA SECURITY MODEL BASED ANOMALY DETERMINATIONS

    公开(公告)号:US20250165612A1

    公开(公告)日:2025-05-22

    申请号:US18516873

    申请日:2023-11-21

    Abstract: Systems, methods, and computer program products are provided herein for data security model based anomaly determinations. An example method includes receiving a product evaluation request that is associated with a first product dataset including product data entries and accessing a data security model. The data security model includes a plurality of data objects including one or more data entries where each data object defines an associated model level indicative of the hierarchical position of the data object within the data security model and one or more links between the data objects that define data object interdependency parameters. The example method includes determining data objects of the data security model applicable to the first product dataset and determining one or more anomalies associated with the first product dataset based on a comparison between the one or more product data entries and the applicable data objects of the data security model.

    System for electronic data obfuscation and protection using independent destructible data objects

    公开(公告)号:US12105794B2

    公开(公告)日:2024-10-01

    申请号:US18125420

    申请日:2023-03-23

    CPC classification number: G06F21/54 G06F21/31 G06F21/604

    Abstract: A system is provided for electronic data obfuscation and protection using independent destructible data objects. The system may split a set of data into a data portion and a key portion, where the data portion may be stored in a database separately from the key portion. The data portion may further comprise a set of executable code for a time or iteration based destructible data object, where the data object may incrementally decrease a countdown value based on the passage of time and/or iterations. If the countdown value reaches a threshold value without being refreshed, the data object may automatically execute one or more processes to protect the set of data. In this way, the system provides a secure way to prevent unauthorized access to sensitive data.

    Systems and methods providing streamlined data correlation in edge computing

    公开(公告)号:US11720602B2

    公开(公告)日:2023-08-08

    申请号:US17315583

    申请日:2021-05-10

    CPC classification number: G06F16/285 G06F16/2379

    Abstract: Embodiments of the present invention provide a system for analyzing and correlating layered electronic data logs for monitored events on a network. The system is configured for identifying one or more entity resources associated with an entity, continuously monitoring the one or more entity resources, identifying at least a first event and a second event associated with at least one entity resource of the one or more entity resources, and performing a correlation analysis at the entity resource prior to transferring the data to a centralized data lake. In this way, the system streamlines the process for correlative analysis by performing resource heavy analysis at the edge of the network and later consolidating such data for further review.

    INTELLIGENT MONITORING AND LOGGING PLATFORM

    公开(公告)号:US20220345472A1

    公开(公告)日:2022-10-27

    申请号:US17238774

    申请日:2021-04-23

    Abstract: An enterprise-wise means for determining monitoring requirements for technology resources, such as, software, hardware, firmware, network or the like and implementing the monitoring. Artificial Intelligence (AI) is implemented to determine monitoring requirements based on characteristics of the technology resource that is to be monitored. In this regard, the characteristics of the technology resource serve to define the problem(s), such as cyber threats and/or performance issues that the technology resource currently faces or will face in the future. By determining the monitoring requirements based on the technology resource's characteristics, including the technological environment, the invention serves to describe what needs to be monitored in terms of the problems that the technology resource currently faces or will face.

    MODEL FRAMEWORK AND SYSTEM FOR CYBER SECURITY SERVICES

    公开(公告)号:US20170302668A1

    公开(公告)日:2017-10-19

    申请号:US15099654

    申请日:2016-04-15

    CPC classification number: H04L63/10 H04L63/1416

    Abstract: Systems, computer program products, and methods are described herein for a model framework and system for cyber security services. The present invention is configured to determine one or more access paths to the internal computing device from an external computing device; determine one or more controls associated with each access path; determine one or more types of access that may be made via one or more of the access paths by the external computing device to access the internal computing device; determine whether the one or more controls associated with the at least one of the one or more access paths is capable of detecting the access; determine one or more tools configured to regulate the one or more controls; and incorporate the one or more tools within the network to regulate the one or more controls to detect and monitor the access.

Patent Agency Ranking