17933614. SYSTEM AND METHOD FOR MONITORING A COMPUTER RESOURCE ASSET USING A SMART CONTRACT AND A NEURAL NETWORK simplified abstract (Saudi Arabian Oil Company)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR MONITORING A COMPUTER RESOURCE ASSET USING A SMART CONTRACT AND A NEURAL NETWORK

Organization Name

Saudi Arabian Oil Company

Inventor(s)

Johara Abdulrahman Al Jarri of Dammam (SA)

Mohammed A. Alfraih of Dhahran (SA)

SYSTEM AND METHOD FOR MONITORING A COMPUTER RESOURCE ASSET USING A SMART CONTRACT AND A NEURAL NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 17933614 titled 'SYSTEM AND METHOD FOR MONITORING A COMPUTER RESOURCE ASSET USING A SMART CONTRACT AND A NEURAL NETWORK

Simplified Explanation

The abstract describes a system and method for monitoring computer resource assets for vulnerabilities and security weaknesses using a smart contract and a neural network.

  • The system includes a processor, memory, artificial neural network, smart contract monitoring subsystem, and a remediation subsystem.
  • The processor receives data from a data source and updates the current smart contract baseline data using the neural network.
  • The artificial neural network determines new data feed and updates the baseline data.
  • The smart contract monitoring subsystem monitors computer resource assets using the current smart contract baseline data.
  • The remediation subsystem is responsible for remediating access of the computer resource asset to a computer network.

Potential Applications

This technology can be applied in cybersecurity to proactively monitor and address vulnerabilities in computer resource assets.

Problems Solved

This technology helps in identifying and addressing security weaknesses and vulnerabilities in computer systems before they can be exploited by malicious actors.

Benefits

The system provides a proactive approach to cybersecurity, helping to prevent potential security breaches and data leaks.

Potential Commercial Applications

One potential commercial application of this technology is in the cybersecurity industry, where companies can use this system to enhance the security of their computer systems and networks.

Possible Prior Art

One possible prior art for this technology could be traditional vulnerability scanning tools and security monitoring systems used in the cybersecurity industry.

Unanswered Questions

How does the system handle real-time monitoring of computer resource assets for vulnerabilities and security weaknesses?

The system uses a combination of a smart contract and a neural network to continuously update the baseline data and monitor the computer resource assets for any vulnerabilities or security weaknesses.

What measures are in place to ensure the accuracy and reliability of the data feed used by the neural network for updating the baseline data?

The system likely includes validation processes and checks to ensure the accuracy and reliability of the data feed used by the neural network, such as data verification algorithms and quality control mechanisms.


Original Abstract Submitted

A system and method monitor a computer resource asset for vulnerability and security weaknesses using a smart contract and a neural network. The system comprises a processor configured to receive data from a data source, a memory configured to store current smart contract baseline data, an artificial neural network including a plurality of nodes configured as a plurality of layers to determine a new data feed in the received data and to update the current smart contract baseline data, a smart contract monitoring subsystem configured to monitor a computer resource asset using the current smart contract baseline data, and a remediation subsystem configured to remediate access of the computer resource asset to a computer network. The method implements the system.