-
公开(公告)号:US11146532B2
公开(公告)日:2021-10-12
申请号:US16200633
申请日:2018-11-26
申请人: Kevin Tobin
发明人: Kevin Tobin
IPC分类号: H04L29/06
摘要: Blockchain technology is used to provide security of electronic systems. The disclosed technology allows for a dynamic bond of trust to be applied to the field of information security without the need for a single point of trust to first be established. The lines of trust between electronic systems or devices is established by distributing information among the systems or devices. This allows for easy identification of commonalities and/or decision making whereby policy(s)/action(s)/monitoring/etc. can be enforced when those commonalities align. Simultaneously, deviations from those commonalities can be identified and policy(s)/action(s)/monitoring/etc. may also be invoked.
-
公开(公告)号:US20190166095A1
公开(公告)日:2019-05-30
申请号:US16200633
申请日:2018-11-26
申请人: Kevin Tobin
发明人: Kevin Tobin
IPC分类号: H04L29/06
摘要: Blockchain technology is used to provide security of electronic systems. The disclosed technology allows for a dynamic bond of trust to be applied to the field of information security without the need for a single point of trust to first be established. The lines of trust between electronic systems or devices is established by distributing information among the systems or devices. This allows for easy identification of commonalities and/or decision making whereby policy(s)/action(s)/monitoring/etc. can be enforced when those commonalities align. Simultaneously, deviations from those commonalities can be identified and policy(s)/action(s)/monitoring/etc. may also be invoked.
-
公开(公告)号:US20220103584A1
公开(公告)日:2022-03-31
申请号:US17498621
申请日:2021-10-11
申请人: Kevin Tobin
发明人: Kevin Tobin
摘要: Blockchain technology is used to provide security of electronic systems. The disclosed technology allows for a dynamic bond of trust to be applied to the field of information security without the need for a single point of trust to first be established. The lines of trust between electronic systems or devices is established by distributing information among the systems or devices. This allows for easy identification of commonalities and/or decision making whereby policy(s)/action(s)/monitoring/etc. can be enforced when those commonalities align. Simultaneously, deviations from those commonalities can be identified and policy(s)/action(s)/monitoring/etc. may also be invoked. The use of blockchain technology enables investigative and responsive actions to detect and exploit a potential attacker on a network.
-
-