USER AND GROUP SPECIFIC THREAT PROTECTION SYSTEM AND METHOD

    公开(公告)号:US20240259402A1

    公开(公告)日:2024-08-01

    申请号:US18591669

    申请日:2024-02-29

    Inventor: Allan Thomson

    CPC classification number: H04L63/1416 H04L63/104

    Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.

    User and group specific threat protection system and method

    公开(公告)号:US11949693B2

    公开(公告)日:2024-04-02

    申请号:US17317707

    申请日:2021-05-11

    Inventor: Allan Thomson

    CPC classification number: H04L63/1416 H04L63/104

    Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.

    SYSTEMS AND METHODS FOR CREDENTIAL-BASED TRANSACTIONS OVER A NETWORK INCORPORATING TRANSACTION CODES

    公开(公告)号:US20250053974A1

    公开(公告)日:2025-02-13

    申请号:US18446068

    申请日:2023-08-08

    Abstract: Systems and methods for transacting over a network is provided. The system includes a first agent and second agent. The first agent is operable to receive from a third agent a transaction code associated with one or more credential types required to apply the transaction code or with one or more credential claim types required to apply the transaction code, transmit the transaction code to the second agent, and receive from the second agent a digitally signed transaction, a first verifiable proof, and the transaction code. The first agent is further operable to transmit to a fourth agent a second verifiable proof based on the first verifiable proof and the transaction code, receive from the fourth agent an unlock signature for a locked credential including one or more credential claims, and transmit the unlock signature to the second agent.

    USER AND GROUP SPECIFIC THREAT PROTECTION SYSTEM AND METHOD

    公开(公告)号:US20220368699A1

    公开(公告)日:2022-11-17

    申请号:US17317707

    申请日:2021-05-11

    Inventor: Allan Thomson

    Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.

    SYSTEMS AND METHODS FOR CREDENTIAL-BASED TRANSACTIONS OVER A NETWORK

    公开(公告)号:US20240205017A1

    公开(公告)日:2024-06-20

    申请号:US18066213

    申请日:2022-12-14

    Inventor: Allan Thomson

    CPC classification number: H04L9/3247

    Abstract: Systems and methods for transacting over a network enable transacting on behalf of a first entity at a plurality of first network locations based on one or more first cryptographically verifiable credentials for a plurality of first network-enabled services. One or more assessments of the first entity are determined based on the transacting on behalf of the first entity at the plurality of first network locations based on the one or more first cryptographically verifiable credentials. One or more second cryptographically verifiable credentials are generated as one or more digitally signed credentials based on the one or more assessments of the first entity. The systems and methods further enable transacting on behalf of the first entity at one or more second network locations based on the one or more second cryptographically verifiable credentials for a second network-enabled service.

    SYSTEMS AND METHODS FOR TRANSACTING OVER A NETWORK

    公开(公告)号:US20240193592A1

    公开(公告)日:2024-06-13

    申请号:US18063284

    申请日:2022-12-08

    CPC classification number: G06Q20/3825 G06Q20/3821 G06Q20/401 G06Q2220/00

    Abstract: Systems and methods for transacting over a network. A first agent and a second agent are provided. The second agent is operable to transact with a third agent for use of a network-enabled service based on a first transaction policy from a fourth agent, the third agent enabled to communicate with a fifth agent. The first agent is operable to communicate with the second agent to facilitate the transacting by the second agent with the third agent for the use of the network-enabled service based on the first transaction policy and communicate with the fifth agent to facilitate the transacting by the second agent with the third agent for the use of the network-enabled service.

    Privacy preserving malicious network activity detection and mitigation

    公开(公告)号:US11895090B2

    公开(公告)日:2024-02-06

    申请号:US17508414

    申请日:2021-10-22

    Inventor: Allan Thomson

    Abstract: A method includes accessing a first intelligence feed including a plurality of cybersecurity incidents. A second intelligence feed is generated including a plurality of technical indicators defined on one or more virtual private network internet point of presence (“VPN internet PoP”) that connects a plurality of VPN tunnels to an internet. The first and second intelligence feeds are compared, a particular incident is determined, and a time frame of the particular incident is determined. Use of a particular VPN internet PoP by a plurality of sources including a plurality of clients is monitored to determine a plurality of time-based behaviors. The plurality of time-based behaviors are compared to the particular incident and to the time frame to determine a match. A particular source is blocked at the particular VPN internet PoP based on the determination of the match.

    SYSTEMS AND METHODS FOR REPUTATION-BASED TRANSACTIONS OVER A NETWORK

    公开(公告)号:US20240154815A1

    公开(公告)日:2024-05-09

    申请号:US18052752

    申请日:2022-11-04

    CPC classification number: H04L9/3247

    Abstract: Systems and methods for transacting over a network. A first agent operating on a first computing system is operable to transact on behalf of a first entity. The first agent transacts with a second agent operating on a second computing system for a first cryptographically verifiable credential, transmits the first cryptographically verifiable credential to a third agent, and transacts with the third agent based on the first cryptographically verifiable credential for a second cryptographically verifiable credential to facilitate transacting with a fourth agent for a service. The second agent is operable to receive telemetry data of the first computing system which is configured to monitor the telemetry data, determine an assessment of the first entity based on the telemetry data, generate the first cryptographically verifiable credential based on the assessment of the first entity by the second agent, and transmit the first cryptographically verifiable credential to the first agent.

    PRIVACY PRESERVING MALICIOUS NETWORK ACTIVITY DETECTION AND MITIGATION

    公开(公告)号:US20230131988A1

    公开(公告)日:2023-04-27

    申请号:US17508414

    申请日:2021-10-22

    Inventor: Allan Thomson

    Abstract: A method includes accessing a first intelligence feed including a plurality of cybersecurity incidents. A second intelligence feed is generated including a plurality of technical indicators defined on one or more virtual private network internet point of presence (“VPN internet PoP”) that connects a plurality of VPN tunnels to an internet. The first and second intelligence feeds are compared, a particular incident is determined, and a time frame of the particular incident is determined. Use of a particular VPN internet PoP by a plurality of sources including a plurality of clients is monitored to determine a plurality of time-based behaviors. The plurality of time-based behaviors are compared to the particular incident and to the time frame to determine a match. A particular source is blocked at the particular VPN internet PoP based on the determination of the match.

Patent Agency Ranking