-
公开(公告)号:US20230069857A1
公开(公告)日:2023-03-09
申请号:US17903018
申请日:2022-09-05
Applicant: Richard D'souza
Inventor: Richard D'souza
Abstract: The present invention relates to management of network security of a computing environment. The method may include; utilizing an Artificial intelligence (AI) node to enable management of one or more physical assets and one or more digital assets of the CE, wherein the management comprises automatic control of at least one task related to access of data and communications thereof, wherein the at least one task is selected from: locking, unlocking, encryption, decryption, activation, and deactivation; detecting a non-desired event, which occurred at one or more physical assets and one or more digital assets; analysing the detected non-desired event through a machine learning technique to determine a customized recovery plan and a tailored protection protocol against the detected non-desired event.
-
公开(公告)号:US20230074843A1
公开(公告)日:2023-03-09
申请号:US17903016
申请日:2022-09-05
Applicant: Richard D'souza
Inventor: Richard D'souza
Abstract: The proposed system employs an architectural arrangement of a plurality of relevant functional element to enable a secure communication. An artificial intelligence (AI) server is communicably coupled with a first local network server, a second local network server, a first computing device and a second computing device over a communication network interface. The AI server, first local network server, the second local network server is arranged to perform one or more security orchestration before transmission of the received encrypted data packet. The first computing device is arranged to receive the transmitted encryption key and the first self-destruction code, from the AI server, associated with the first communication request. Similarly, the second computing device receive the communicated acquired TEDP, the decryption key and the second self-destruction code, perform decryption, execution of the second self-destruction code to destroy the decryption key and triggers an execution command to execute the first self-destruction code to destroy the encryption key.
-
3.
公开(公告)号:US20240396719A1
公开(公告)日:2024-11-28
申请号:US18322707
申请日:2023-05-24
Applicant: Richard D'souza
Inventor: Richard D'souza
IPC: H04L9/08
Abstract: The present system relates to a quantum key distribution (QKD) based secure communication. The system includes a transmission device operatively coupled with a receiver device. The transmission device can create a quantum key, which is encrypted and transmitted over a secure communication channel, to the receiver device. The receiver device verifies integrity of the received encrypted quantum key and generates a random number, which can be utilized by transmission device to generate a shared key by using artificial intelligence module. The shared key is utilized to exchange communication data between the transmission device and receiver device by utilising QKD protocols.
-
公开(公告)号:US12218963B2
公开(公告)日:2025-02-04
申请号:US17903017
申请日:2022-09-05
Applicant: Richard D'souza
Inventor: Richard D'souza
Abstract: The present invention relates management of security of a computing environment. The method may include; monitoring and learning, through a master computer, a data traffic of the each of the coupled connecting node to alter a security design to speed up the communications; analysing, through the master computer, the data traffic to categorize the each of the coupled connecting node into a first category of node, which is accessed by a human and a second category of node, which is accessed by a bot; utilizing, at the master computer, one or more secured hidden servers for determining a first data communication route to speed up data traffic for the human and a second data communication route to prevent data traffic above a pre-set limit, for the bot.
-
公开(公告)号:US20230007036A1
公开(公告)日:2023-01-05
申请号:US17903017
申请日:2022-09-05
Applicant: Richard D'souza
Inventor: Richard D'souza
Abstract: The present invention relates management of security of a computing environment. The method may include; monitoring and learning, through a master computer, a data traffic of the each of the coupled connecting node to alter a security design to speed up the communications; analysing, through the master computer, the data traffic to categorize the each of the coupled connecting node into a first category of node, which is accessed by a human and a second category of node, which is accessed by a bot; utilizing, at the master computer, one or more secured hidden servers for determining a first data communication route to speed up data traffic for the human and a second data communication route to prevent data traffic above a pre-set limit, for the bot.
-
公开(公告)号:US12155683B2
公开(公告)日:2024-11-26
申请号:US17903015
申请日:2022-09-05
Applicant: Richard D'souza
Inventor: Richard D'souza
Abstract: The proposed system employs one or more steps and an architectural arrangement of a plurality of relevant functional element to enable a security. A USB device is arranged to enable secure access of a computing device. A first cloud server is arranged to receive an ID, a cryptographic key, an authentication PIN and a pre-stored data from the computing device. The first cloud server encrypts the received pre-stored data using the received cryptographic key and subsequently transmits the ID, the cryptographic key and the authentication PIN, to a second cloud server. Further, the second cloud server performs a plurality of sequential functional operation, critical to the motive and objective of deploying the proposed system.
-
公开(公告)号:US12088715B2
公开(公告)日:2024-09-10
申请号:US17903016
申请日:2022-09-05
Applicant: Richard D'souza
Inventor: Richard D'souza
CPC classification number: H04L9/3066 , H04L9/0861
Abstract: The proposed system employs an architectural arrangement of a plurality of relevant functional element to enable a secure communication. An artificial intelligence (AI) server is communicably coupled with a first local network server, a second local network server, a first computing device and a second computing device over a communication network interface. The AI server, first local network server, the second local network server is arranged to perform one or more security orchestration before transmission of the received encrypted data packet. The first computing device is arranged to receive the transmitted encryption key and the first self-destruction code, from the AI server, associated with the first communication request. Similarly, the second computing device receive the communicated acquired TEDP, the decryption key and the second self-destruction code, perform decryption, execution of the second self-destruction code to destroy the decryption key and triggers an execution command to execute the first self-destruction code to destroy the encryption key.
-
公开(公告)号:US20230073309A1
公开(公告)日:2023-03-09
申请号:US17903015
申请日:2022-09-05
Applicant: Richard D'souza
Inventor: Richard D'souza
Abstract: The proposed system employs one or more steps and an architectural arrangement of a plurality of relevant functional element to enable a security. A USB device is arranged to enable secure access of a computing device. A first cloud server is arranged to receive an ID, a cryptographic key, an authentication PIN and a pre-stored data from the computing device. The first cloud server encrypts the received pre-stored data using the received cryptographic key and subsequently transmits the ID, the cryptographic key and the authentication PIN, to a second cloud server. Further, the second cloud server performs a plurality of sequential functional operation, critical to the motive and objective of deploying the proposed system.
-
-
-
-
-
-
-