[go: up one dir, main page]

GB202406625D0 - Systems and methods for synchronizing and protecting data - Google Patents

Systems and methods for synchronizing and protecting data

Info

Publication number
GB202406625D0
GB202406625D0 GBGB2406625.0A GB202406625A GB202406625D0 GB 202406625 D0 GB202406625 D0 GB 202406625D0 GB 202406625 A GB202406625 A GB 202406625A GB 202406625 D0 GB202406625 D0 GB 202406625D0
Authority
GB
United Kingdom
Prior art keywords
synchronizing
systems
methods
protecting data
protecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
GBGB2406625.0A
Other versions
GB2628919A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AS0001 Inc
Original Assignee
AS0001 Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US18/203,630 external-priority patent/US20240340301A1/en
Application filed by AS0001 Inc filed Critical AS0001 Inc
Priority claimed from GB2406444.6A external-priority patent/GB2632532A/en
Publication of GB202406625D0 publication Critical patent/GB202406625D0/en
Publication of GB2628919A publication Critical patent/GB2628919A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0621Electronic shopping [e-shopping] by configuring or customising goods or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Signal Processing (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Technology Law (AREA)
  • Data Mining & Analysis (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Storage Device Security (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Hardware Redundancy (AREA)
  • Emergency Protection Circuit Devices (AREA)
GB2406625.0A 2023-04-06 2024-04-05 Systems and methods for synchronizing and protecting data Pending GB2628919A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US202363457671P 2023-04-06 2023-04-06
US18/203,630 US20240340301A1 (en) 2022-05-31 2023-05-30 Adaptive security architecture based on state of posture
GB2406444.6A GB2632532A (en) 2023-04-06 2024-04-05 Systems and methods for catastrophic incident and protection

Publications (2)

Publication Number Publication Date
GB202406625D0 true GB202406625D0 (en) 2024-06-26
GB2628919A GB2628919A (en) 2024-10-09

Family

ID=91581455

Family Applications (8)

Application Number Title Priority Date Filing Date
GB2406665.6A Pending GB2628925A (en) 2023-04-06 2024-04-05 Systems and methods for posture-based modeling
GB2406661.5A Pending GB2628923A (en) 2023-04-06 2024-04-05 Adaptive security architecture based on state of posture
GB2406627.6A Pending GB2628920A (en) 2023-04-06 2024-04-05 Systems and methods for posture-based modelling
GB2406658.1A Active GB2628921B (en) 2023-04-06 2024-04-05 Systems and methods for configuration locking
GB2406625.0A Pending GB2628919A (en) 2023-04-06 2024-04-05 Systems and methods for synchronizing and protecting data
GB2406621.9A Pending GB2628918A (en) 2023-04-06 2024-04-05 Systems and methods for protection modeling
GB2406664.9A Active GB2628924B (en) 2023-04-06 2024-04-05 Systems and methods for security intelligence exchange
GB2406659.9A Pending GB2628922A (en) 2023-04-06 2024-04-05 Adaptive security architecture based on state of posture

Family Applications Before (4)

Application Number Title Priority Date Filing Date
GB2406665.6A Pending GB2628925A (en) 2023-04-06 2024-04-05 Systems and methods for posture-based modeling
GB2406661.5A Pending GB2628923A (en) 2023-04-06 2024-04-05 Adaptive security architecture based on state of posture
GB2406627.6A Pending GB2628920A (en) 2023-04-06 2024-04-05 Systems and methods for posture-based modelling
GB2406658.1A Active GB2628921B (en) 2023-04-06 2024-04-05 Systems and methods for configuration locking

Family Applications After (3)

Application Number Title Priority Date Filing Date
GB2406621.9A Pending GB2628918A (en) 2023-04-06 2024-04-05 Systems and methods for protection modeling
GB2406664.9A Active GB2628924B (en) 2023-04-06 2024-04-05 Systems and methods for security intelligence exchange
GB2406659.9A Pending GB2628922A (en) 2023-04-06 2024-04-05 Adaptive security architecture based on state of posture

Country Status (2)

Country Link
GB (8) GB2628925A (en)
WO (1) WO2024211703A2 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2024145437A (en) * 2023-03-31 2024-10-15 株式会社日立製作所 Destination Maliciousness Assessment System, Destination Maliciousness Assessment Program, and Destination Maliciousness Assessment Method
US12425438B1 (en) * 2023-04-21 2025-09-23 Hitrust Services Corp. Threat activity statistical analysis driven adaptation of a control specification
CN119520075B (en) * 2024-11-15 2025-09-23 华中科技大学 Network penetration test method and system based on state feedback
CN119675908B (en) * 2024-11-22 2025-10-17 广西电网有限责任公司 Power communication network security situation prediction method and system
CN119377358A (en) * 2024-12-26 2025-01-28 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) A threat intelligence credibility analysis method for multi-source information conflict
CN119652686B (en) * 2025-02-19 2025-04-18 广东申立信息工程股份有限公司 Distributed anomaly detection method for security situation awareness AI large model
CN120246322B (en) * 2025-05-19 2025-12-05 东莞市旭田包装机械有限公司 A method and system for adjusting the binding force of a strapping machine
CN120342790B (en) * 2025-06-19 2025-08-22 泸州市兴泸实业发展有限公司 Network security situation awareness system
CN120429764B (en) * 2025-06-27 2025-09-09 达州职业技术学院 Low-altitude operation situation awareness method based on artificial intelligence and spectral clustering

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008147400A1 (en) * 2006-11-30 2008-12-04 Brown University Authentication for operations over an outsourced file system stored by an untrusted unit
WO2016022705A1 (en) * 2014-08-05 2016-02-11 AttackIQ, Inc. Cyber security posture validation platform
US10148679B2 (en) * 2015-12-09 2018-12-04 Accenture Global Solutions Limited Connected security system
US10135862B1 (en) * 2015-12-04 2018-11-20 Amazon Technologies, Inc. Testing security incident response through automated injection of known indicators of compromise
US10609065B2 (en) * 2016-08-30 2020-03-31 Kivu Consulting, Inc. Systems and methods for identifying and mapping sensitive data on an enterprise
US11503061B1 (en) * 2020-02-03 2022-11-15 Rapid7, Inc. Automatic evalution of remediation plans using exploitability risk modeling
CA3131208C (en) * 2021-09-17 2024-01-02 B Data Solutions Inc. System and method for building a trusted network of devices
US12047400B2 (en) * 2022-05-31 2024-07-23 As0001, Inc. Adaptive security architecture based on state of posture

Also Published As

Publication number Publication date
GB2628924B (en) 2025-04-02
GB202406661D0 (en) 2024-06-26
GB202406665D0 (en) 2024-06-26
GB2628920A (en) 2024-10-09
GB2628921B (en) 2025-05-28
GB202406659D0 (en) 2024-06-26
GB2628924A (en) 2024-10-09
GB2628918A (en) 2024-10-09
GB202406664D0 (en) 2024-06-26
GB2628923A (en) 2024-10-09
GB2628921A (en) 2024-10-09
GB2628922A (en) 2024-10-09
GB2628925A (en) 2024-10-09
GB202406658D0 (en) 2024-06-26
GB202406621D0 (en) 2024-06-26
GB2628919A (en) 2024-10-09
WO2024211703A2 (en) 2024-10-10
WO2024211703A3 (en) 2024-12-26
GB202406627D0 (en) 2024-06-26

Similar Documents

Publication Publication Date Title
GB202406625D0 (en) Systems and methods for synchronizing and protecting data
SG11202012856RA (en) System and method for blockchain-based data synchronization
EP3545644B8 (en) System and method for information protection
SG11202109329WA (en) System and associated method for ensuring data privacy
GB201908567D0 (en) Systems and methods for synchronising data streams
AU2018347196A1 (en) System and method for information protection
AU2018347197A1 (en) System and method for information protection
PL3602457T3 (en) System and method for blockchain-based data management
GB201905348D0 (en) Computer implemented method and system for encrypting data
GB202110159D0 (en) Blockchain technology for data integrity regulation and proof of existence in data protection systems
IL273628A (en) System and method for providing secure data access
EP3997834A4 (en) Data protection and recovery systems and methods
EP4260336A4 (en) Systems and methods for data masking
EP4054205C0 (en) Audio system data synchronization method and audio component
SG10202102099XA (en) Data complementing system and data complementing method
GB202109064D0 (en) Computer implemented method and system
GB2610953B (en) System and method for dimensioning objects
GB202210613D0 (en) Computer implemented systems and methods
CA3287557A1 (en) Systems and methods for linking devices and protecting data
EP4097561A4 (en) System and method for synchronizing and/or disciplining clocks
GB201913348D0 (en) Data deletion system and method
GB202105670D0 (en) Methods and systems for data recovery
GB202107368D0 (en) System and method for securely transferring data
GB202307750D0 (en) Methods and systems for data transfer
GB202511897D0 (en) Methods and systems for data transfer