SYSTEM FOR CONTAINERIZATION-BASED COUNTERMEASURES TO CYBERSECURITY VULNERABILITIES

    公开(公告)号:US20240305660A1

    公开(公告)日:2024-09-12

    申请号:US18119109

    申请日:2023-03-08

    CPC classification number: H04L63/1433 H04L63/1416

    Abstract: A system is provided for containerization-based countermeasures to cybersecurity vulnerabilities. In particular, the system may generate one or more containers (e.g., virtual environments), where each container may be configured to execute one or more tasks. At least a portion of the containers may be decoy containers that may be executing one or more decoy tasks. The system may then use a randomized process to change which containers are decoy and/or which tasks or jobs are executed within each container. Each container may be associated with a cryptographic key such that each container may be hashed by the system and compared against a reference hash associated with the container. If the hash has changed, the system may determine that the container has been modified and subsequently implement one or more intelligent remediation processes.

    System for implementing resource access protocols within a networked medium

    公开(公告)号:US12106275B2

    公开(公告)日:2024-10-01

    申请号:US17533265

    申请日:2021-11-23

    CPC classification number: G06Q20/1235 G06F16/27 H04L63/10 G06Q2220/18

    Abstract: Systems, computer program products, and methods are described herein for implementing resource access protocols within a networked medium. The present invention is configured to receive, from a second user input device of a second user, a request to access a resource in the metaverse; retrieve a non-fungible token (NFT) of the resource in response to the request; retrieve, from a licensing layer associated with the NFT of the resource, licensing rules associated with access to the resource; determine, using a valuation engine, a value associated with access to the resource based on at least the one or more licensing rules; receive, from the second user input device, an indication acknowledging the licensing rules and a digital transfer of an amount of funds corresponding to the value associated with the access to the resource; and authorize the second user input device to access the resource in the metaverse.

    SYSTEM FOR IMPLEMENTING RESOURCE TRACKING PROTOCOLS WITHIN A NETWORKED MEDIUM

    公开(公告)号:US20230177628A1

    公开(公告)日:2023-06-08

    申请号:US17540577

    申请日:2021-12-02

    CPC classification number: G06Q50/184 G06F16/27

    Abstract: Systems, computer program products, and methods are described herein implementing resource tracking protocols within a networked medium in a metaverse. The present invention is configured to receive a first request to transfer ownership of a resource from a first user to a second user in the metaverse; retrieve an NFT for the resource in response to receiving the first request; display the value of the NFT for the resource to a second user input device; receive a value transfer corresponding to the value of the NFT for the resource; retrieve allocation subroutines associated with the request to transfer ownership of the NFT for the resource; trigger the allocation subroutines value transfer corresponding to the value of the NFT for the resource; generate, using an NFT generator, an updated NFT for the resource indicating transfer of ownership of the resource; and record the updated NFT on the distributed ledger.

    System for isolated access and analysis of suspicious code in a disposable computing environment

    公开(公告)号:US11636203B2

    公开(公告)日:2023-04-25

    申请号:US16907994

    申请日:2020-06-22

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.

    DATA PROCESSING TRANSACTIONS BETWEEN DISPARATE SYSTEMS USING A UNIVERSAL PROCESSOR

    公开(公告)号:US20240406272A1

    公开(公告)日:2024-12-05

    申请号:US18799890

    申请日:2024-08-09

    Abstract: A system is provided including a host processor, a plurality of service processors, a universal processor associated with the host processor and capable of exchanging data with each service processor, a first user device of the first user and a second user device of a second user. The universal processor receives a request from the first user device for a data transaction between the host processor and a service processor, and in response generates a code that can be interpreted by the service processor. Universal processor transmits the code to the first user device, which transmits the code to the second user device. The second user device transmits the code to the service processor. The service processor decodes the code and requests the universal processor to perform the data transaction with the host processor. In response, the universal processor sets up the data transaction.

Patent Agency Ranking