GB202406625D0 - Systems and methods for synchronizing and protecting data - Google Patents
Systems and methods for synchronizing and protecting dataInfo
- Publication number
- GB202406625D0 GB202406625D0 GBGB2406625.0A GB202406625A GB202406625D0 GB 202406625 D0 GB202406625 D0 GB 202406625D0 GB 202406625 A GB202406625 A GB 202406625A GB 202406625 D0 GB202406625 D0 GB 202406625D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- synchronizing
- systems
- methods
- protecting data
- protecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0621—Electronic shopping [e-shopping] by configuring or customising goods or services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Human Resources & Organizations (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Signal Processing (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Operations Research (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Technology Law (AREA)
- Data Mining & Analysis (AREA)
- Game Theory and Decision Science (AREA)
- Educational Administration (AREA)
- Storage Device Security (AREA)
- Alarm Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Hardware Redundancy (AREA)
- Emergency Protection Circuit Devices (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202363457671P | 2023-04-06 | 2023-04-06 | |
| US18/203,630 US20240340301A1 (en) | 2022-05-31 | 2023-05-30 | Adaptive security architecture based on state of posture |
| GB2406444.6A GB2632532A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for catastrophic incident and protection |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB202406625D0 true GB202406625D0 (en) | 2024-06-26 |
| GB2628919A GB2628919A (en) | 2024-10-09 |
Family
ID=91581455
Family Applications (8)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB2406665.6A Pending GB2628925A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for posture-based modeling |
| GB2406661.5A Pending GB2628923A (en) | 2023-04-06 | 2024-04-05 | Adaptive security architecture based on state of posture |
| GB2406627.6A Pending GB2628920A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for posture-based modelling |
| GB2406658.1A Active GB2628921B (en) | 2023-04-06 | 2024-04-05 | Systems and methods for configuration locking |
| GB2406625.0A Pending GB2628919A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for synchronizing and protecting data |
| GB2406621.9A Pending GB2628918A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for protection modeling |
| GB2406664.9A Active GB2628924B (en) | 2023-04-06 | 2024-04-05 | Systems and methods for security intelligence exchange |
| GB2406659.9A Pending GB2628922A (en) | 2023-04-06 | 2024-04-05 | Adaptive security architecture based on state of posture |
Family Applications Before (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB2406665.6A Pending GB2628925A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for posture-based modeling |
| GB2406661.5A Pending GB2628923A (en) | 2023-04-06 | 2024-04-05 | Adaptive security architecture based on state of posture |
| GB2406627.6A Pending GB2628920A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for posture-based modelling |
| GB2406658.1A Active GB2628921B (en) | 2023-04-06 | 2024-04-05 | Systems and methods for configuration locking |
Family Applications After (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB2406621.9A Pending GB2628918A (en) | 2023-04-06 | 2024-04-05 | Systems and methods for protection modeling |
| GB2406664.9A Active GB2628924B (en) | 2023-04-06 | 2024-04-05 | Systems and methods for security intelligence exchange |
| GB2406659.9A Pending GB2628922A (en) | 2023-04-06 | 2024-04-05 | Adaptive security architecture based on state of posture |
Country Status (2)
| Country | Link |
|---|---|
| GB (8) | GB2628925A (en) |
| WO (1) | WO2024211703A2 (en) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2024145437A (en) * | 2023-03-31 | 2024-10-15 | 株式会社日立製作所 | Destination Maliciousness Assessment System, Destination Maliciousness Assessment Program, and Destination Maliciousness Assessment Method |
| US12425438B1 (en) * | 2023-04-21 | 2025-09-23 | Hitrust Services Corp. | Threat activity statistical analysis driven adaptation of a control specification |
| CN119520075B (en) * | 2024-11-15 | 2025-09-23 | 华中科技大学 | Network penetration test method and system based on state feedback |
| CN119675908B (en) * | 2024-11-22 | 2025-10-17 | 广西电网有限责任公司 | Power communication network security situation prediction method and system |
| CN119377358A (en) * | 2024-12-26 | 2025-01-28 | 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) | A threat intelligence credibility analysis method for multi-source information conflict |
| CN119652686B (en) * | 2025-02-19 | 2025-04-18 | 广东申立信息工程股份有限公司 | Distributed anomaly detection method for security situation awareness AI large model |
| CN120246322B (en) * | 2025-05-19 | 2025-12-05 | 东莞市旭田包装机械有限公司 | A method and system for adjusting the binding force of a strapping machine |
| CN120342790B (en) * | 2025-06-19 | 2025-08-22 | 泸州市兴泸实业发展有限公司 | Network security situation awareness system |
| CN120429764B (en) * | 2025-06-27 | 2025-09-09 | 达州职业技术学院 | Low-altitude operation situation awareness method based on artificial intelligence and spectral clustering |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2008147400A1 (en) * | 2006-11-30 | 2008-12-04 | Brown University | Authentication for operations over an outsourced file system stored by an untrusted unit |
| WO2016022705A1 (en) * | 2014-08-05 | 2016-02-11 | AttackIQ, Inc. | Cyber security posture validation platform |
| US10148679B2 (en) * | 2015-12-09 | 2018-12-04 | Accenture Global Solutions Limited | Connected security system |
| US10135862B1 (en) * | 2015-12-04 | 2018-11-20 | Amazon Technologies, Inc. | Testing security incident response through automated injection of known indicators of compromise |
| US10609065B2 (en) * | 2016-08-30 | 2020-03-31 | Kivu Consulting, Inc. | Systems and methods for identifying and mapping sensitive data on an enterprise |
| US11503061B1 (en) * | 2020-02-03 | 2022-11-15 | Rapid7, Inc. | Automatic evalution of remediation plans using exploitability risk modeling |
| CA3131208C (en) * | 2021-09-17 | 2024-01-02 | B Data Solutions Inc. | System and method for building a trusted network of devices |
| US12047400B2 (en) * | 2022-05-31 | 2024-07-23 | As0001, Inc. | Adaptive security architecture based on state of posture |
-
2024
- 2024-04-05 GB GB2406665.6A patent/GB2628925A/en active Pending
- 2024-04-05 GB GB2406661.5A patent/GB2628923A/en active Pending
- 2024-04-05 WO PCT/US2024/023262 patent/WO2024211703A2/en not_active Ceased
- 2024-04-05 GB GB2406627.6A patent/GB2628920A/en active Pending
- 2024-04-05 GB GB2406658.1A patent/GB2628921B/en active Active
- 2024-04-05 GB GB2406625.0A patent/GB2628919A/en active Pending
- 2024-04-05 GB GB2406621.9A patent/GB2628918A/en active Pending
- 2024-04-05 GB GB2406664.9A patent/GB2628924B/en active Active
- 2024-04-05 GB GB2406659.9A patent/GB2628922A/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| GB2628924B (en) | 2025-04-02 |
| GB202406661D0 (en) | 2024-06-26 |
| GB202406665D0 (en) | 2024-06-26 |
| GB2628920A (en) | 2024-10-09 |
| GB2628921B (en) | 2025-05-28 |
| GB202406659D0 (en) | 2024-06-26 |
| GB2628924A (en) | 2024-10-09 |
| GB2628918A (en) | 2024-10-09 |
| GB202406664D0 (en) | 2024-06-26 |
| GB2628923A (en) | 2024-10-09 |
| GB2628921A (en) | 2024-10-09 |
| GB2628922A (en) | 2024-10-09 |
| GB2628925A (en) | 2024-10-09 |
| GB202406658D0 (en) | 2024-06-26 |
| GB202406621D0 (en) | 2024-06-26 |
| GB2628919A (en) | 2024-10-09 |
| WO2024211703A2 (en) | 2024-10-10 |
| WO2024211703A3 (en) | 2024-12-26 |
| GB202406627D0 (en) | 2024-06-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB202406625D0 (en) | Systems and methods for synchronizing and protecting data | |
| SG11202012856RA (en) | System and method for blockchain-based data synchronization | |
| EP3545644B8 (en) | System and method for information protection | |
| SG11202109329WA (en) | System and associated method for ensuring data privacy | |
| GB201908567D0 (en) | Systems and methods for synchronising data streams | |
| AU2018347196A1 (en) | System and method for information protection | |
| AU2018347197A1 (en) | System and method for information protection | |
| PL3602457T3 (en) | System and method for blockchain-based data management | |
| GB201905348D0 (en) | Computer implemented method and system for encrypting data | |
| GB202110159D0 (en) | Blockchain technology for data integrity regulation and proof of existence in data protection systems | |
| IL273628A (en) | System and method for providing secure data access | |
| EP3997834A4 (en) | Data protection and recovery systems and methods | |
| EP4260336A4 (en) | Systems and methods for data masking | |
| EP4054205C0 (en) | Audio system data synchronization method and audio component | |
| SG10202102099XA (en) | Data complementing system and data complementing method | |
| GB202109064D0 (en) | Computer implemented method and system | |
| GB2610953B (en) | System and method for dimensioning objects | |
| GB202210613D0 (en) | Computer implemented systems and methods | |
| CA3287557A1 (en) | Systems and methods for linking devices and protecting data | |
| EP4097561A4 (en) | System and method for synchronizing and/or disciplining clocks | |
| GB201913348D0 (en) | Data deletion system and method | |
| GB202105670D0 (en) | Methods and systems for data recovery | |
| GB202107368D0 (en) | System and method for securely transferring data | |
| GB202307750D0 (en) | Methods and systems for data transfer | |
| GB202511897D0 (en) | Methods and systems for data transfer |