System for electronic data encryption and decryption using a consensus draft process

    公开(公告)号:US11979484B2

    公开(公告)日:2024-05-07

    申请号:US17381882

    申请日:2021-07-21

    Inventor: Brandon Sloane

    Abstract: A system is provided for electronic data encryption and decryption using a consensus draft process. In particular, the system may use a custom encryption algorithm that generates an array with a number of entries that is dependent on the number of computing devices that participate in the encryption process. The encryption algorithm may cause a first computing device to open and read the array, randomly select and remove an entry, and pass on the remaining entries to a second computing device. The second computing device may then open and read the array, randomly select and remove an entry, then pass the remaining entries to a third computing device. The process may be executed in a reiterative manner until the entire array is distributed among the participating computing devices. In this way, encryption of data may be performed without revealing shared information among the participating computing devices.

    System for quantification of cybersecurity module efficacy using Q-matrix based correlation analysis

    公开(公告)号:US11934532B2

    公开(公告)日:2024-03-19

    申请号:US17342870

    申请日:2021-06-09

    CPC classification number: G06F21/577 G06F17/16 G06F17/18 G06F2221/034

    Abstract: A system is provided for quantification of cybersecurity module efficacy using Q-matrix based correlation analysis. In particular, the system may use Q-matrices to calculate adaptive correlation scores between cybersecurity module and expected and/or desired outcomes across one or more different dimensions. A first axis of the Q-matrix for a particular cybersecurity module may be populated with one or more key elements of the cybersecurity module, while a second axis of the Q-matrix may comprise the outputs or metrics that may be used to quantify the efficacy of the cybersecurity module with respect to the key elements as represented on the first axis. The correlation scores may then be used as inputs into a decisioning engine that may be used to drive entity-wide decisioning processes based on the outputs of the Q-matrix based analysis.

    SYSTEM FOR SECURED ELECTRONIC DATA ACCESS THROUGH MACHINE-LEARNING BASED ANALYSIS OF COMBINED ACCESS AUTHORIZATIONS

    公开(公告)号:US20230344822A1

    公开(公告)日:2023-10-26

    申请号:US17725017

    申请日:2022-04-20

    CPC classification number: H04L63/083 H04L63/0428 H04L41/16

    Abstract: A system is provided for secured electronic data access through machine-learning based analysis of combined access authorizations. In particular, the system may maintain an access provisioning database which stores data regarding the data access authorizations that have been granted to one or more third party computing systems or entities. The system may further continuously monitor and aggregate electronic data from one or more electronic data streams and analyze the electronic data to intelligently generate probabilities for future events that create certain combinations of access authorizations that affect the security of the electronic data to which the third party computing systems have authorized access. In this way, the system may provide an effective way to manage access authorizations.

    Secure access control framework using dynamic resource replication

    公开(公告)号:US11755697B2

    公开(公告)日:2023-09-12

    申请号:US17140934

    申请日:2021-01-04

    CPC classification number: G06F21/31 G06F9/5005 G06N20/00 G06F2221/2123

    Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.

    SYSTEM FOR DYNAMIC NODE ANALYSIS FOR NETWORK SECURITY RESPONSE

    公开(公告)号:US20230179614A1

    公开(公告)日:2023-06-08

    申请号:US17542973

    申请日:2021-12-06

    Abstract: Systems, computer program products, and methods are described herein for dynamic node analysis for network security response. The present invention is configured to detect, using a node analysis engine, a change in a network security protocol associated with a first node within a distributed network; extract information associated with the change in the network security protocol associated with the first node; identify one or more adjacent nodes with a first degree of separation from the first node in response to detecting the change; determine a first set of changes to the network security protocols for the one or more adjacent nodes based on at least the information associated with the change in the network security protocol of the first node; and automatically implement the first set of changes to the network security protocols of the one or more adjacent nodes with the first degree of separation from the first node.

Patent Agency Ranking