OWRITA TECHNOLOGIES LTD. (20240338474). Verification of Network or Machine-Based Events Through Query to Responsible Users simplified abstract

From WikiPatents
Jump to navigation Jump to search

Verification of Network or Machine-Based Events Through Query to Responsible Users

Organization Name

OWRITA TECHNOLOGIES LTD.

Inventor(s)

Asaf Shelly of Oranit (IL)

Verification of Network or Machine-Based Events Through Query to Responsible Users - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240338474 titled 'Verification of Network or Machine-Based Events Through Query to Responsible Users

The abstract of the patent application describes a method for verifying events on a computer system by detecting events requiring authorization, identifying responsible users, issuing queries to them, and approving or flagging events based on their responses.

  • Detecting events requiring authorization
  • Identifying responsible users for authorization
  • Issuing queries to responsible users for approval
  • Approving or flagging events based on user responses
  • Crowdsourcing cybersecurity event responses within an organization
  • Supervising artificial intelligence

Potential Applications: - Cybersecurity event verification - Authorization processes in computer systems - Monitoring and supervising artificial intelligence systems

Problems Solved: - Ensuring proper authorization of events on computer systems - Enhancing cybersecurity measures within organizations - Providing oversight for artificial intelligence systems

Benefits: - Improved event verification processes - Enhanced cybersecurity practices - Efficient supervision of artificial intelligence systems

Commercial Applications: Title: "Event Verification System for Enhanced Cybersecurity" This technology can be used in industries such as finance, healthcare, and government where secure event authorization is crucial. It can also be marketed to cybersecurity firms and organizations looking to improve their security measures.

Prior Art: Researchers can explore prior patents related to event verification systems, cybersecurity authorization methods, and artificial intelligence supervision tools to understand the existing technology landscape.

Frequently Updated Research: Stay updated on advancements in event verification systems, cybersecurity protocols, and artificial intelligence supervision techniques to ensure the technology remains cutting-edge and effective.

Questions about Event Verification System: 1. How does this method improve cybersecurity practices within organizations? 2. What are the potential risks associated with relying on user responses for event authorization?


Original Abstract Submitted

a method for verification of an event occurring on a computer system includes: detecting an event requiring authorization; identifying one or more users that are responsible for authorizing the event; issuing at least one query to each of the one or more responsible users regarding whether the event is authorized; and based on the responses of the one or more responsible users, either approving the event or flagging the event as potentially unauthorized. the step of issuing at least one query may include prompting each of the identified responsible users to select from one of the following three tags: (1) “clear,” signifying approval of the event; (2) “flag,” signifying disapproval of the event; and (3) “dismiss,” signifying referral of the event to others. the method may be used to crowd-source the response to cybersecurity events within an organization, and to supervise artificial intelligence.