-
公开(公告)号:WO2023026270A1
公开(公告)日:2023-03-02
申请号:PCT/IL2022/050837
申请日:2022-08-02
Applicant: OWRITA TECHNOLOGIES LTD
Inventor: SHELLY, Asaf
Abstract: A method for verification of an event occurring on a computer system includes: detecting an event requiring authorization; identifying one or more users that are responsible for authorizing the event; issuing at least one query to each of the one or more responsible users regarding whether the event is authorized; and based on the responses of the one or more responsible users, either approving the event or flagging the event as potentially unauthorized. The step of issuing at least one query may include prompting each of the identified responsible users to select from one of the following three tags: (1) "Clear," signifying approval of the event; (2) "Flag," signifying disapproval of the event; and (3) "Dismiss," signifying referral of the event to others. The method may be used to crowd-source the response to cybersecurity events within an organization, and to supervise artificial intelligence.