-
公开(公告)号:US20230351339A1
公开(公告)日:2023-11-02
申请号:US18059164
申请日:2022-11-28
发明人: Paul Walker , Phil J. Venables
CPC分类号: G06Q20/06 , G06Q20/065 , G06Q20/382 , G06Q20/36 , G06Q40/04 , G06Q20/3674 , G06Q20/3678 , H04L9/3247 , H04L9/3236 , H04L9/30 , H04L63/126 , H04L2209/56 , H04L9/50
摘要: The present disclosure is directed to security settlement in financial markets and cryptographic currencies. Particular portions of the present disclosure are directed to a cryptographic currency protocol and to a cryptographic currency that includes a positional item. The cryptographic currency protocol supports a virtual wallet that, in various embodiments, is a security and cash account for storing and managing the cryptographic currency. Opening a transaction via the virtual wallet to transfer the cryptographic currency is a strong guarantee of the availability of funds in the virtual wallet because, e.g., funds are not transacted unless the commit phase is successful.
-
公开(公告)号:US11514409B2
公开(公告)日:2022-11-29
申请号:US15618508
申请日:2017-06-09
发明人: Paul Walker , Phil J. Venables
摘要: The present disclosure is directed to security settlement in financial markets and cryptographic currencies. Particular portions of the present disclosure are directed to a cryptographic currency protocol and to a cryptographic currency that includes a positional item. The cryptographic currency protocol supports a virtual wallet that, in various embodiments, is a security and cash account for storing and managing the cryptographic currency. Opening a transaction via the virtual wallet to transfer the cryptographic currency is a strong guarantee of the availability of funds in the virtual wallet because, e.g., funds are not transacted unless the commit phase is successful.
-
公开(公告)号:US20180343278A1
公开(公告)日:2018-11-29
申请号:US16036138
申请日:2018-07-16
发明人: David Vallone , Peter Taylor , Phil J. Venables , Ruoh-Yann Huang
CPC分类号: H04L63/1433 , H04L41/046 , H04L41/0823 , H04L41/0886 , H04L41/145 , H04L41/147 , H04L43/50
摘要: A system, method, and device are presented for assessing a target network's vulnerability to a real cyberthreat based on determining policy-based synthetic tests configured to model the behavior of the cyberthreat. Real-time feedback from the target network (e.g., servers, desktops, and network/monitoring hardware and/or software equipment) are received, analyzed, and used to determine whether any modifications to the same or a new synthesized test is preferred. The technology includes self-healing processes that, using the feedback mechanisms, can attempt to find patches for known vulnerabilities, test for unknown vulnerabilities, and configure the target network's resources in accordance with predefined service-level agreements.
-
公开(公告)号:US20170278081A1
公开(公告)日:2017-09-28
申请号:US15618508
申请日:2017-06-09
发明人: Paul Walker , Phil J. Venables
CPC分类号: G06Q20/06 , G06Q20/065 , G06Q20/36 , G06Q20/3674 , G06Q20/3678 , G06Q20/382 , G06Q40/04 , H04L9/30 , H04L9/3236 , H04L9/3247 , H04L63/126 , H04L2209/38 , H04L2209/56
摘要: The present disclosure is directed to security settlement in financial markets and cryptographic currencies. Particular portions of the present disclosure are directed to a cryptographic currency protocol and to a cryptographic currency that includes a positional item. The cryptographic currency protocol supports a virtual wallet that, in various embodiments, is a security and cash account for storing and managing the cryptographic currency. Opening a transaction via the virtual wallet to transfer the cryptographic currency is a strong guarantee of the availability of funds in the virtual wallet because, e.g., funds are not transacted unless the commit phase is successful.
-
公开(公告)号:US10574685B2
公开(公告)日:2020-02-25
申请号:US16036138
申请日:2018-07-16
发明人: David Vallone , Peter Taylor , Phil J. Venables , Ruoh-Yann Huang
摘要: A system, method, and device are presented for assessing a target network's vulnerability to a real cyberthreat based on determining policy-based synthetic tests configured to model the behavior of the cyberthreat. Real-time feedback from the target network (e.g., servers, desktops, and network/monitoring hardware and/or software equipment) are received, analyzed, and used to determine whether any modifications to the same or a new synthesized test is preferred. The technology includes self-healing processes that, using the feedback mechanisms, can attempt to find patches for known vulnerabilities, test for unknown vulnerabilities, and configure the target network's resources in accordance with predefined service-level agreements.
-
-
-
-