System for using a distributed ledger to manage user entitlements to computing resources

    公开(公告)号:US10986097B2

    公开(公告)日:2021-04-20

    申请号:US15966982

    申请日:2018-04-30

    Abstract: An access control system may include one or more computer processors; a memory, wherein the memory comprises an entitlement database of a resource access manager; a network communication device; and an access control module stored in the memory, executable by the one or more computer processors. The access control module may be configured to: perform the steps of: receiving a request to add one or more entitlement data records to a distributed electronic ledger; validating the one or more entitlement data records; appending the one or more entitlement data records to the distributed electronic ledger; and verifying a first entitlement data record stored in the entitlement database by comparing the first entitlement data record with a first corresponding entitlement data record stored in the distributed electronic ledger, wherein the first entitlement data record and first corresponding entitlement data record are both associated with a first user.

    SYSTEM FOR GENERATING DISTRIBUTED CLOUD DATA STORAGE ON DISPARATE DEVICES

    公开(公告)号:US20190158593A1

    公开(公告)日:2019-05-23

    申请号:US15816848

    申请日:2017-11-17

    CPC classification number: H04L67/1097 H04L63/0428 H04L63/083 H04L69/40

    Abstract: A system is configured to allocate storage space on existing devices within the entity's networked system to create cloud storage space. In particular, unallocated space on computing devices, typically user devices, within an entity's network is utilized as a cloud data repository. Cloud data is indexed, divided into chunks, encrypted, and stored on numerous disparate endpoint devices connected to the network. Copies of cloud chunk data may be duplicated across multiple endpoint devices to allow for data redundancy, thereby ensuring cloud data uptime according to the availability needs of the entity. Cloud data may further be allocated to different devices based on regional data restrictions. In this way, the system provides an efficient and secure way to generate an internal cloud data storage repository within an entity's networked system.

    SYSTEM FOR AUTHORIZING SECURED ACCESS USING CRYPTOGRAPHIC HASH VALUE VALIDATIONS

    公开(公告)号:US20230024308A1

    公开(公告)日:2023-01-26

    申请号:US17957748

    申请日:2022-09-30

    Abstract: A system for authorizing secured access using cryptographic hash value validations is provided. In particular, the system may receive requests from users and/or computing systems to obtain secured access a particular resource or to execute a certain process. In response, the system may require that the user and/or computing system complete additional required steps (e.g., a computation) before being granted access to the resources or processes. In this way, the system may prevent unauthorized or unintended access to the system’s resources or processes.

    System for authorizing secured access using cryptographic hash value validations

    公开(公告)号:US11539528B2

    公开(公告)日:2022-12-27

    申请号:US16806420

    申请日:2020-03-02

    Abstract: A system for authorizing secured access using cryptographic hash value validations is provided. In particular, the system may receive requests from users and/or computing systems to obtain secured access a particular resource or to execute a certain process. In response, the system may require that the user and/or computing system complete additional required steps (e.g., a computation) before being granted access to the resources or processes. In this way, the system may prevent unauthorized or unintended access to the system's resources or processes.

    SYSTEM FOR AUTHORIZING SECURED ACCESS USING CRYPTOGRAPHIC HASH VALUE VALIDATIONS

    公开(公告)号:US20210273808A1

    公开(公告)日:2021-09-02

    申请号:US16806420

    申请日:2020-03-02

    Abstract: A system for authorizing secured access using cryptographic hash value validations is provided. In particular, the system may receive requests from users and/or computing systems to obtain secured access a particular resource or to execute a certain process. In response, the system may require that the user and/or computing system complete additional required steps (e.g., a computation) before being granted access to the resources or processes. In this way, the system may prevent unauthorized or unintended access to the system's resources or processes.

    Secure access control framework using dynamic resource replication

    公开(公告)号:US11755697B2

    公开(公告)日:2023-09-12

    申请号:US17140934

    申请日:2021-01-04

    CPC classification number: G06F21/31 G06F9/5005 G06N20/00 G06F2221/2123

    Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.

    Indicator regression and modeling for implementing system changes to improve control effectiveness

    公开(公告)号:US10810006B2

    公开(公告)日:2020-10-20

    申请号:US15688253

    申请日:2017-08-28

    Abstract: Embodiments of the present invention provide a system for indicator regression and modeling for implementing system changes to improve control effectiveness. The system is typically configured for presenting, prompting for and receiving a selection from a list of controls from a user, via a control effectiveness application user interface on a user device. The system is also for receiving two or more consideration indicators from the user device, via the control effectiveness application user interface forming a consideration set; applying a regression algorithm on the consideration set of indicators; reducing a number of the subset of the consideration set of indicators based on a threshold correlation or a threshold number; finalizing the final equation with the number of the subset, each having a corresponding coefficient; and, in response to finalizing the final equation, automatically performing an action configured to improve effectiveness of the control based on the final equation.

    SYSTEM FOR USING A DISTRIBUTED LEDGER TO MANAGE USER ENTITLEMENTS TO COMPUTING RESOURCES

    公开(公告)号:US20190334912A1

    公开(公告)日:2019-10-31

    申请号:US15966982

    申请日:2018-04-30

    Abstract: An access control system may include one or more computer processors; a memory, wherein the memory comprises an entitlement database of a resource access manager; a network communication device; and an access control module stored in the memory, executable by the one or more computer processors. The access control module may be configured to: perform the steps of: receiving a request to add one or more entitlement data records to a distributed electronic ledger; validating the one or more entitlement data records; appending the one or more entitlement data records to the distributed electronic ledger; and verifying a first entitlement data record stored in the entitlement database by comparing the first entitlement data record with a first corresponding entitlement data record stored in the distributed electronic ledger, wherein the first entitlement data record and first corresponding entitlement data record are both associated with a first user.

    SECURE ACCESS CONTROL FRAMEWORK USING DYNAMIC RESOURCE REPLICATION

    公开(公告)号:US20220215078A1

    公开(公告)日:2022-07-07

    申请号:US17140934

    申请日:2021-01-04

    Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.

    Exposure based secure access system

    公开(公告)号:US11087323B2

    公开(公告)日:2021-08-10

    申请号:US16107386

    申请日:2018-08-21

    Abstract: Systems, computer program products, and methods are described herein for regulating exposure based secured access is presented. The present invention is configured to receive, from a user computing device, a request to access a network device to execute one or more actions, wherein the user computing device is associated with a payment token; receive information associated with the one or more actions, wherein the information comprises an exposure level; initiate an authorization module associated with the distributed network environment; determine, using the authorization module, a token amount to execute the one or more actions; automatically retrieve, from the user computing device, the token amount from the payment token; authorize the user computing device to access the network device to execute the one or more actions; and access and update a blockchain distributed ledger based on information associated with the request and subsequent authorization to access the network device.

Patent Agency Ranking