AS0001, Inc. (20240283639). SYSTEMS AND METHODS FOR CONFIGURATION LOCKING simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR CONFIGURATION LOCKING

Organization Name

AS0001, Inc.

Inventor(s)

Jonathan J. Thompson of Carmel IN (US)

SYSTEMS AND METHODS FOR CONFIGURATION LOCKING - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240283639 titled 'SYSTEMS AND METHODS FOR CONFIGURATION LOCKING

Simplified Explanation

The patent application describes systems, methods, and computer-readable storage media for enhancing cybersecurity protections across entities. It involves a response system that identifies and encrypts configurations related to operational or security actions on computing systems, recording them on a distributed ledger or data source.

  • The system includes a response system with processing circuits and memory.
  • The processor identifies and encrypts first-level configurations related to actions on computing systems.
  • The encrypted configurations are recorded on a distributed ledger or data source.

Key Features and Innovation

  • Identification and encryption of configurations related to operational or security actions.
  • Recording encrypted configurations on a distributed ledger or data source.

Potential Applications

This technology can be applied in various industries such as finance, healthcare, and government to enhance cybersecurity measures.

Problems Solved

This technology addresses the need for improved cybersecurity protections across entities by securely recording configurations related to operational or security actions.

Benefits

  • Enhanced cybersecurity protections.
  • Secure recording of configurations on a distributed ledger.
  • Improved data security and integrity.

Commercial Applications

Title: Enhanced Cybersecurity Protection System This technology can be commercially used by organizations to strengthen their cybersecurity measures and ensure the secure recording of operational and security configurations.

Questions about the Technology

How does this technology improve cybersecurity protections?

This technology enhances cybersecurity protections by securely recording configurations related to operational or security actions on computing systems.

What industries can benefit from this technology?

Various industries such as finance, healthcare, and government can benefit from this technology to enhance their cybersecurity measures.


Original Abstract Submitted

systems, methods, and computer-readable storage media for improving cybersecurity protections across entities. one system includes a response system including one or more processing circuits including memory and at least one processor configured to identify a plurality of first level configurations corresponding to at least one of an operational or security action performed on the a plurality of computing systems of an entity of a plurality of entities. the at least one processor further configured to encrypt or tokenize the plurality of first level configurations. the at least one processor further configured to record the plurality of first level configurations on the distributed ledger or data source.