Systems and methods for blockchain security data intelligence
First Claim
1. A method of detecting vulnerabilities and anomalies in a distributed computational environment, the method comprising the steps of:
- receiving, from a client environment, at least one input data distributed among a plurality of nodes within a particular network;
receiving, from at least one of the plurality of nodes, the at least one input data into a curator engine, receiving, from the curator engine, the at least one input data into a transaction engine;
evaluating the at least one input data for information and events or vectors of attack;
validating the information and events or vectors of attack;
ranking the information and events or vectors of attack as an indicator;
logging the indicator into the node of the particular network;
recording the indicator into a blockchain database as a transaction having a unique transaction identifier;
reading, by a rule engine, the transaction from the blockchain database;
processing, by the rule engine, the transaction so to make a decision to transform or analyze the transaction based on a predetermined set of rules;
receiving, by an action engine, transaction from the rule engine; and
processing, by the action engine, the transaction received from the rule engine, wherein the action engine decides a predetermined action and generates feedback to the client environment based on the predetermined action.
7 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed to systems and methods configured to gather, transmit, share and process security related data between end users and security applications/devices across multiple platforms using blockchain open implementation as the backend and smart contracts integrated with artificial intelligence and behavior analysis using rule engines to enforce/implement data decisions. The system is designed to continuously predict, monitor, prevent, detect, response and mitigate cyber threats. The process includes a self-enforced adaptable engine that has a fast incident response time and makes quick smart decisions. This is a resilient system that is constantly capturing data, learning, tracking and enforcing. Computational power is maximized by leveraging smart contracts to validate transactions between network devices, share encrypted and protected information about their functions, events across the network of nodes and make smart swarm decisions.
29 Citations
18 Claims
-
1. A method of detecting vulnerabilities and anomalies in a distributed computational environment, the method comprising the steps of:
-
receiving, from a client environment, at least one input data distributed among a plurality of nodes within a particular network; receiving, from at least one of the plurality of nodes, the at least one input data into a curator engine, receiving, from the curator engine, the at least one input data into a transaction engine; evaluating the at least one input data for information and events or vectors of attack; validating the information and events or vectors of attack; ranking the information and events or vectors of attack as an indicator; logging the indicator into the node of the particular network; recording the indicator into a blockchain database as a transaction having a unique transaction identifier; reading, by a rule engine, the transaction from the blockchain database; processing, by the rule engine, the transaction so to make a decision to transform or analyze the transaction based on a predetermined set of rules; receiving, by an action engine, transaction from the rule engine; and processing, by the action engine, the transaction received from the rule engine, wherein the action engine decides a predetermined action and generates feedback to the client environment based on the predetermined action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification