Log in
Enquire now
‌

US Patent 11968235 System and method for cybersecurity analysis and protection using distributed systems

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
119682350
Patent Inventor Names
Michael James0
Farooq Shaikh0
Jason Crabtree0
Andrew Sellers0
Date of Patent
April 23, 2024
0
Patent Application Number
175897740
Date Filed
January 31, 2022
0
Patent Citations
‌
US Patent 8914878 Detecting malicious network software agents
0
‌
US Patent 9882929 Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network
0
‌
US Patent 9887933 Method and apparatus to throttle media access by web crawlers
0
‌
US Patent 9946517 Dynamic model based software application development
0
‌
US Patent 10027688 Method and system for detecting malicious and/or botnet-related domain names
0
‌
US Patent 10044675 Integrating a honey network with a target network to counter IP and peer-checking evasion techniques
0
‌
US Patent 10061635 Cyber physical system
0
‌
US Patent 10102480 Machine learning service
0
...
Patent Primary Examiner
‌
Cheng-Feng Huang
0
CPC Code
‌
H04L 63/1416
0
‌
H04L 63/1475
0
‌
G06F 16/2477
0
‌
G06F 16/951
0
‌
H04L 63/0281
0
‌
H04L 63/1441
0
‌
H04L 63/1433
0
‌
H04L 63/1425
0
...
Patent abstract

A system and method for cybersecurity reconnaissance, analysis, and scoring that uses distributed, cloud-based computing services to provide sufficient scalability for analysis of enterprise IT networks using only publicly available characterizations. The system and method comprise an in-memory associative array which manages a queue of vulnerability search tasks through a public-facing proxy network. The public-facing proxy network has search nodes configurable to present the network to search tools in a desired manner to control certain aspects of the search to obtain the desired results. A distributed data processing engine and cloud-based storage are used to provide scalable computing power and storage. A data packet modifier is used to reveal the IP address of a threat actor behind a port scan and subsequently block the threat actor. Each of the cloud-based computing services is containerized and orchestrated for management and efficient scaling purposes.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11968235 System and method for cybersecurity analysis and protection using distributed systems

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.