Dell Products L.P. (20240330529). ARTIFICIAL AGING OF DIGITAL TWIN TO SIMULATE CYBERSECURITY ISSUE ASSOCIATED WITH INFRASTRUCTURE simplified abstract

From WikiPatents
Revision as of 11:51, 8 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

ARTIFICIAL AGING OF DIGITAL TWIN TO SIMULATE CYBERSECURITY ISSUE ASSOCIATED WITH INFRASTRUCTURE

Organization Name

Dell Products L.P.

Inventor(s)

Said Tabet of Austin TX (US)

Judith A. Furlong of Natick MA (US)

Aidan O Mahony of Cork (IE)

ARTIFICIAL AGING OF DIGITAL TWIN TO SIMULATE CYBERSECURITY ISSUE ASSOCIATED WITH INFRASTRUCTURE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240330529 titled 'ARTIFICIAL AGING OF DIGITAL TWIN TO SIMULATE CYBERSECURITY ISSUE ASSOCIATED WITH INFRASTRUCTURE

The abstract of the patent application describes techniques for managing virtual representations, such as digital twins, of infrastructure. The method involves obtaining a virtual representation of an infrastructure in a first state and using datasets to advance it to a second state, where results indicate cybersecurity issues that can be addressed through remedial or preventative actions.

  • Obtaining virtual representations of infrastructure in different states
  • Applying datasets to advance the virtual representations
  • Identifying cybersecurity issues through the results
  • Initiating remedial or preventative actions to address the issues
  • Enhancing cybersecurity measures in infrastructure

Potential Applications: - Monitoring and managing infrastructure remotely - Improving cybersecurity measures in critical infrastructure - Enhancing predictive maintenance of assets

Problems Solved: - Identifying cybersecurity issues in infrastructure - Taking proactive measures to prevent cyber threats - Enhancing overall security of critical infrastructure

Benefits: - Increased cybersecurity resilience - Improved asset management - Enhanced operational efficiency

Commercial Applications: Title: "Advanced Cybersecurity Management for Infrastructure" This technology can be applied in industries such as energy, transportation, and manufacturing to enhance cybersecurity measures and ensure the reliability of critical infrastructure.

Prior Art: Researchers can explore existing patents related to digital twins, cybersecurity management, and infrastructure monitoring to understand the prior art in this field.

Frequently Updated Research: Stay updated on advancements in digital twin technology, cybersecurity solutions, and infrastructure management to leverage the latest innovations in this field.

Questions about the technology: 1. How does this technology improve cybersecurity measures in infrastructure? - This technology enhances cybersecurity by using virtual representations to identify and address potential threats before they escalate.

2. What are the key benefits of using virtual representations for infrastructure management? - Virtual representations enable real-time monitoring, predictive maintenance, and enhanced security measures in critical infrastructure.


Original Abstract Submitted

techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. for example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state, and applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. the method further comprises obtaining results representing the infrastructure in the second state, responsive to applying the at least one dataset to the virtual representation, wherein at least a portion of the results are indicative of a cybersecurity issue on the infrastructure, and then initiating one or more of a remedial action and a preventative action with respect to the infrastructure to address the cybersecurity issue.