20240039945. VIRTUAL REALITY AND DIGITAL TWIN-BASED SECURITY TESTCASE EXECUTION simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

VIRTUAL REALITY AND DIGITAL TWIN-BASED SECURITY TESTCASE EXECUTION

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Tushar Agrawal of West Fargo ND (US)

Christian Compton of Austin TX (US)

Jeremy R. Fox of Georgetown TX (US)

Sarbajit K. Rakshit of Kolkata (IN)

VIRTUAL REALITY AND DIGITAL TWIN-BASED SECURITY TESTCASE EXECUTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240039945 titled 'VIRTUAL REALITY AND DIGITAL TWIN-BASED SECURITY TESTCASE EXECUTION

Simplified Explanation

The abstract describes a computer-implemented method for generating a digital twin of a physical environment using data defining its physical and security characteristics. The digital twin is then used to simulate a set of test conditions to evaluate the security characteristics. The results of the evaluation are outputted.

  • The method generates a digital twin of a physical environment using data on its physical and security characteristics.
  • The digital twin is used to simulate a set of test conditions.
  • The simulation of the test conditions is analyzed to evaluate the security characteristics.
  • The results of the evaluation are outputted.

Potential Applications:

  • Security testing and evaluation of physical environments.
  • Assessing vulnerabilities and weaknesses in security systems.
  • Planning and optimizing security measures in physical environments.

Problems Solved:

  • Lack of efficient and effective methods for testing and evaluating the security characteristics of physical environments.
  • Difficulty in identifying vulnerabilities and weaknesses in security systems.
  • Inadequate planning and optimization of security measures in physical environments.

Benefits:

  • Improved security in physical environments through better testing and evaluation.
  • Enhanced identification of vulnerabilities and weaknesses in security systems.
  • More effective planning and optimization of security measures in physical environments.


Original Abstract Submitted

a computer-implemented method, in accordance with one embodiment, includes generating, using data defining physical characteristics and security characteristics of a physical environment, a digital twin of the physical environment. a set of test conditions are simulated within the digital twin of the physical environment to test the security characteristics. the simulation of the set of test conditions are analyzed for evaluating the security characteristics. a result of the evaluation is output.