Jump to content

The Toronto-Dominion Bank (20250077681). CORRECTING SECURITY VULNERABILITIES WITH GENERATIVE ARTIFICIAL: Difference between revisions

From WikiPatents
Creating a new page
 
Creating a new page
 
Line 8: Line 8:


[[Category:The Toronto-Dominion Bank]]
[[Category:The Toronto-Dominion Bank]]
==Inventor(s)==
[[:Category:Gopendu Sen of Milton (CA)|Gopendu Sen of Milton (CA)]][[Category:Gopendu Sen of Milton (CA)]]
==CORRECTING SECURITY VULNERABILITIES WITH GENERATIVE ARTIFICIAL==
This abstract first appeared for US patent application 20250077681 titled 'CORRECTING SECURITY VULNERABILITIES WITH GENERATIVE ARTIFICIAL
==Original Abstract Submitted==
an example operation may include one or more of monitoring communications that occur with user devices over a shared computer network, detecting a security threat from the monitored communications, generating a software program to simulate the security threat over the shared computer network based on execution of a generative artificial intelligence (genai) model on a description of the security threat and a repository of source code, installing the source code for simulating the security threat on a system associated with the computer network, and executing the source code for simulating the security threat via the system.
[[Category:G06F21/57]]
[[Category:G06F8/61]]
[[Category:G06F21/53]]
[[Category:G06N3/0455]]
[[Category:G06N3/0475]]
[[Category:CPC_G06F21/577]]

Latest revision as of 02:22, 17 March 2025

CORRECTING SECURITY VULNERABILITIES WITH GENERATIVE ARTIFICIAL

Organization Name

The Toronto-Dominion Bank

Inventor(s)

Gopendu Sen of Milton (CA)

CORRECTING SECURITY VULNERABILITIES WITH GENERATIVE ARTIFICIAL

This abstract first appeared for US patent application 20250077681 titled 'CORRECTING SECURITY VULNERABILITIES WITH GENERATIVE ARTIFICIAL

Original Abstract Submitted

an example operation may include one or more of monitoring communications that occur with user devices over a shared computer network, detecting a security threat from the monitored communications, generating a software program to simulate the security threat over the shared computer network based on execution of a generative artificial intelligence (genai) model on a description of the security threat and a repository of source code, installing the source code for simulating the security threat on a system associated with the computer network, and executing the source code for simulating the security threat via the system.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.