NETWORK SECURITY SYSTEM FOR ROGUE DEVICES

    公开(公告)号:US20210377237A1

    公开(公告)日:2021-12-02

    申请号:US16890564

    申请日:2020-06-02

    Abstract: A security system that provides for secure communication between systems on a network without the need for encrypting the packets related to the communication, and thus, provides secure communications over the network without the processing capacity, memory, and/or processing delays caused by encryption of the packets. The disclosure aids in preventing rogue systems from being able to read communications over the network without the need for encryption. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets.

    SYSTEM FOR AUTHORIZING SECURED ACCESS USING CRYPTOGRAPHIC HASH VALUE VALIDATIONS

    公开(公告)号:US20210273808A1

    公开(公告)日:2021-09-02

    申请号:US16806420

    申请日:2020-03-02

    Abstract: A system for authorizing secured access using cryptographic hash value validations is provided. In particular, the system may receive requests from users and/or computing systems to obtain secured access a particular resource or to execute a certain process. In response, the system may require that the user and/or computing system complete additional required steps (e.g., a computation) before being granted access to the resources or processes. In this way, the system may prevent unauthorized or unintended access to the system's resources or processes.

    Event prediction and impact mitigation system

    公开(公告)号:US11023812B2

    公开(公告)日:2021-06-01

    申请号:US15688267

    申请日:2017-08-28

    Abstract: Embodiments of the present invention provide a system for predicting one or more events and mitigating the impact of the one or more events. The system is typically configured for presenting a list of exposures to a user via an event prediction application user interface, prompting the user to select an exposure from the list of exposures, receiving a selection of the exposure and at least one option from the user device, determining type of the exposure based on the at least one option, determining one or more distribution models based on the type of the exposure, estimating occurrence of the one or more events associated with the exposure using at least one distribution model from the one or more distribution models, and in response to estimating the occurrence of the one or more events, triggering one or more automated counter measures.

    Edge computing system for monitoring and maintaining data center operations

    公开(公告)号:US10721135B1

    公开(公告)日:2020-07-21

    申请号:US16442655

    申请日:2019-06-17

    Abstract: A system for implementing edge computing and smart sensors at a data center is provided. The system may monitor behavior changes and collect data about servers within the data center. The system may make changes based on the collected data. The system may use simple network management protocol (“SNMP”) to recover data and trace data at relatively rapid speeds. The system may be able to identify duplicate data records, copy the duplicate data records and eliminate the need to access a disaster recovery center. The system may also detect when a server is exceeding or nearly exceeding resource utilization. When a server is determined to be nearing a resource threshold, the server may transmit an alert and/or automatically place an order to upgrade resources. In some embodiments, the system may monitor multiple data centers. In these embodiments, each data center may be considered to be a server.

    EVENT CORRELATION THREAT SYSTEM
    35.
    发明申请

    公开(公告)号:US20200058034A1

    公开(公告)日:2020-02-20

    申请号:US16105777

    申请日:2018-08-20

    Abstract: Threats may be determined for events in isolation, however, many threats are not identified and/or realized without the occurrence of two or more events. The invention allows for identifying, prioritizing, and remitting the threats that may occur as a result of the combination of events. The invention utilizes the creation of a threat framework, which is populated with events that are defined by event characteristics using an N-tuple. Each event may have an event threat magnitude, as well as an event threat vector that illustrates the severity and likelihood of the event threat and the alignment of the threat event with related threats, and which can be used to determine an event threat assessment for the combination of events. The one or more threat frameworks may be represented by plotting the events in a dimensional Cartesian space illustrating the event threat magnitude and event threat vector.

    MULTIDIMENSIONAL GRAPH STRUCTURED DATABASE WITH PROPERTY AND RELATIONSHIP SUBCLASSES

    公开(公告)号:US20190114369A1

    公开(公告)日:2019-04-18

    申请号:US15786153

    申请日:2017-10-17

    Abstract: The invention provides a multidimensional graph database with property and relationship subclasses. In comparison to current graph database technology, which only allows for the creation of nodes, relationships, and properties for the nodes and relationships, the new multidimensional graph database treats properties as a separate object class. In this way, each property may in turn have one or more of its own properties and/or relationships to other nodes, relationships, or properties. The system is able to add as many layers of properties and relationships as needed to precisely represent the data as well as the relationships between and/or amongst the data. By extending the graph database schema beyond the conventional bounds, the multidimensional graph database increases the efficiency of database queries while simultaneously increasing the depth and quality of the data produced by the search queries.

    SYSTEM FOR GENERATION AND EXECUTION OF EVENT IMPACT MITIGATION

    公开(公告)号:US20190087570A1

    公开(公告)日:2019-03-21

    申请号:US15709571

    申请日:2017-09-20

    Inventor: Brandon Sloane

    Abstract: Embodiments of the present invention provide a system for mitigating impact of one or more predicted events. The system is typically configured for estimating occurrence of one or more events associated with a first exposure using the at least distribution model, determining at least one event similar or identical to the one or more events from an exposure library, extracting a first set of automated counter measures associated with the at least one similar or identical event form the exposure library, formulating one or more automated counter measures for the one or more events based on the extracted first set of automated counter measures, store the one or more automated counter measures for one or more events in the exposure library, and executing the one or more automated counter measures to mitigate the one or more events associated with the first exposure.

    System for securing electronic devices and electronic data using automated dynamic control modifications

    公开(公告)号:US12301630B2

    公开(公告)日:2025-05-13

    申请号:US17725138

    申请日:2022-04-20

    Abstract: A system is provided for securing electronic devices and electronic data using automated dynamic control modifications. In particular, the system may comprise one or more electronic devices or computing devices, each of which may have a protection module installed thereon, where the security module may be configured by the system. The security module may define a time period within which the computing device must establish an authenticated connection to an authorized and/or trusted network. If the time period elapses without an authenticated connection and/or upon the occurrence of certain predetermined conditions, the security module may perform a secure wipe of the data on the computing device. In this way, the system may provide a way to secure electronic devices and data within the network environment.

    SYSTEM AND METHOD FOR SELF-CLUSTERING EDGE COMPUTING PROTECTION

    公开(公告)号:US20240406219A1

    公开(公告)日:2024-12-05

    申请号:US18802244

    申请日:2024-08-13

    Abstract: Systems, computer program products, and methods are described herein for self-clustering computing protocols. The present invention is configured to detect, using a node analysis engine, a change in a network security protocol associated with a first node or device within a distributed network, and transmit instructions for the first node or device to broadcast the change to nearby nodes or devices such that they can act in concert to protect against identifies security issues.

Patent Agency Ranking