COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR AUTONOMOUS CYBERSECURITY WITHIN A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for autonomous cybersecurity. The method may include: receiving data elements relating to resources and/or activity within a network computing environment; feeding at least some of the elements to an optimizer program to calculate a first distance to a system goal; based on the first distance, implementing pre-determined changes in the environment; receiving post-implementation data records relating to resources and/or activity within the environment; calculating a second distance to the system goal by feeding the post-implementation data records to the optimizer program; and configuring the optimizer program for additional advancement toward the system goal based on comparison of the first and second distances.
COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR ENABLED INTERVENTION INTO A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for enabled intervention into a network computing environment. The method may include: obtaining, via the monitoring, data relating to an action performed in the network computing environment; matching the data to a first enabled action program profile of a plurality of enabled action program profiles, the first enabled action program profile prescribing an enabled action program; and performing one or both of the following: (i) executing the enabled action program to cause a pre-determined change in the network computing environment; and (ii) attaching the enabled action program to a natural language narrative describing the action.
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR NARRATIVE REPRESENTATION OF A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for targeted narrative-structure representation of a network computing environment. The method may include: monitoring the network computing environment; obtaining, via the monitoring, data relating to an action performed in the network computing environment; selecting a first preference set from a plurality of preference sets, each of the preference sets corresponding to a respective one of a plurality of user roles and including a first structural narrative definition configured for the corresponding one of the user roles; generating a first natural language narrative describing the action based on the selected first preference set; and exposing or providing a representation of the first natural language narrative to an individual user assigned to a first user role of the user roles corresponding to the first preference set.
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR NARRATIVE REPRESENTATION OF A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for feedback-driven narrative-structure representation of a network computing environment. The method may include: monitoring the network computing environment; obtaining, via the monitoring, data relating to an action performed in the network computing environment; generating an initial natural language narrative describing the action; exposing or providing a representation of the initial natural language narrative to an individual user; receiving input from the individual user in response to the initial natural language narrative; based at least in part on the input, generating a revised natural language narrative relating to the action; and exposing or providing a representation of the revised natural language narrative to the individual user.
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
5.
COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR ENABLED INTERVENTION INTO A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for enabled intervention into a network computing environment. The method may include: obtaining, via the monitoring, data relating to an action performed in the network computing environment; matching the data to a first enabled action program profile of a plurality of enabled action program profiles, the first enabled action program profile prescribing an enabled action program; and performing one or both of the following: (i) executing the enabled action program to cause a pre-determined change in the network computing environment; and (ii) attaching the enabled action program to a natural language narrative describing the action.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
6.
Computer-implemented methods, systems comprising computer-readable media, and electronic devices for narrative representation of a network computing environment
A computer-implemented method for targeted narrative-structure representation of a network computing environment. The method may include: monitoring the network computing environment; obtaining, via the monitoring, data relating to an action performed in the network computing environment; selecting a first preference set from a plurality of preference sets, each of the preference sets corresponding to a respective one of a plurality of user roles and including a first structural narrative definition configured for the corresponding one of the user roles; generating a first natural language narrative describing the action based on the selected first preference set; and exposing or providing a representation of the first natural language narrative to an individual user assigned to a first user role of the user roles corresponding to the first preference set.
G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
7.
COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR NARRATIVE REPRESENTATION OF A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for feedback-driven narrative-structure representation of a network computing environment. The method may include: monitoring the network computing environment; obtaining, via the monitoring, data relating to an action performed in the network computing environment; generating an initial natural language narrative describing the action; exposing or providing a representation of the initial natural language narrative to an individual user; receiving input from the individual user in response to the initial natural language narrative; based at least in part on the input, generating a revised natural language narrative relating to the action; and exposing or providing a representation of the revised natural language narrative to the individual user.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
8.
Computer-implemented methods, systems comprising computer-readable media, and electronic devices for narrative-structured representation of and intervention into a network computing environment
A computer-implemented method for narrative-structured representation of and intervention into a network computing environment. The method may include: attaching an enabled action program to an abstracted natural language narrative, where execution of the enabled action program causes pre-determined changes in the behavior and/or capabilities of an entity within the network computing environment; generating a representation of the abstracted natural language narrative that includes an enabled action link and an abstraction-toggle link for retrieval of a representation of an unabstracted natural language narrative; upon activation of the abstraction-toggle link, retrieving the representation of the unabstracted natural language narrative; and upon activation of the enabled action link, automatically implementing the pre-determined changes within the network computing environment.
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
9.
Computer-implemented methods, systems comprising computer-readable media, and electronic devices for narrative-structured representation of and intervention into a network computing environment
A computer-implemented method for narrative-structured representation of and intervention into a network computing environment. The method may include: attaching an enabled action program to an abstracted natural language narrative, where execution of the enabled action program causes pre-determined changes in the behavior and/or capabilities of an entity within the network computing environment; generating a representation of the abstracted natural language narrative that includes an enabled action link and an abstraction-toggle link for retrieval of a representation of an unabstracted natural language narrative; upon activation of the abstraction-toggle link, retrieving the representation of the unabstracted natural language narrative; and upon activation of the enabled action link, automatically implementing the pre-determined changes within the network computing environment.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
10.
COMPUTER-IMPLEMENTED METHODS FOR EXPANDED ENTITY AND ACTIVITY MAPPING WITHIN A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for expanded entity and activity mapping within a network computing environment. The method may include: retrieving records relating to an activity within the environment; identifying an orphan record among the records that does not match, and a plurality of pre-matched records among the records that do match, one or more predefined node and edge profiles; building test graph database models respectively corresponding to alternative test profiles for modeling the orphan record; and building a production graph database model based at least in part on the test profile corresponding to the test graph database model exhibiting the best identity tracing characteristics among all the test graph database models.
G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
11.
COMPUTER-IMPLEMENTED METHODS, SYSTEMS COMPRISING COMPUTER-READABLE MEDIA, AND ELECTRONIC DEVICES FOR RESOURCE PRESERVATION AND INTERVENTION WITHIN A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for resource preservation and intervention. The method may include: enumerating a plurality of resources within a network computing environment based on data elements relating to activities and/or resources in the environment; classifying the resources under one of a plurality of pre-defined categories; based on the classification, assigning a plurality of enabled action programs to each of the resources, wherein execution of the enabled action programs causes pre-determined changes in the behavior and/or capabilities of the corresponding one of the resources; based on the classification of the resources, applying one of a plurality of data preservation programs to resources within the environment, wherein execution of the data preservation programs causes collection of corresponding pre- defined resource data; and, for each of the resources, exposing the corresponding pre-defined resource data and the assigned enabled action programs to and for use via a client device.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
12.
ACTIVITY VERIFICATION WITHIN A NETWORK COMPUTING ENVIRONMENT
A computer-implemented method for activity verification within a network computing environment. The method may include: retrieving a verification requirement defining an activity within the network computing environment, a candidate verifier, and contact information for the candidate verifier; transmitting a request for participation to the candidate verifier; upon confirmation, enrolling the confirmed verifier to the verification requirement; receiving a post-enrollment data record relating to an observed activity within the network computing environment; matching the observed activity to the verification requirement; transmitting a verification request to the enrolled confirmed verifier; receiving a verification response from the enrolled confirmed verifier; based on the verification response, generating a command to restrict or permit the observed activity within the network computing environment.
A computer-implemented method for narrative-structured representation of and intervention into a network computing environment. The method may include: attaching an enabled action program to an abstracted natural language narrative, where execution of the enabled action program causes pre-determined changes in the behavior and/or capabilities of an entity within the network computing environment; generating a representation of the abstracted natural language narrative that includes an enabled action link and an abstraction-toggle link for retrieval of a representation of an unabstracted natural language narrative; upon activation of the abstraction-toggle link, retrieving the representation of the unabstracted natural language narrative; and upon activation of the enabled action link, automatically implementing the pre-determined changes within the network computing environment.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 12/08 - Adressage ou affectationRéadressage dans des systèmes de mémoires hiérarchiques, p. ex. des systèmes de mémoire virtuelle
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Software as a service (SAAS) services, namely, hosting software for use by others for use in monitoring, accessing, investigating, and reviewing recorded data in the fields of computer and network security, information technology, and cybersecurity sold as a component of non-downloadable software
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable software in the nature of a mobile application for monitoring, accessing, investigating, and reviewing recorded data in the fields of computer and network security, information technology, and cybersecurity sold as a component of downloadable software
16.
Computer-implemented methods, systems comprising computer-readable media, and electronic devices for expanded entity and activity mapping within a network computing environment
A computer-implemented method for expanded entity and activity mapping within a network computing environment. The method may include: retrieving records relating to an activity within the environment; identifying an orphan record among the records that does not match, and a plurality of pre-matched records among the records that do match, one or more pre-defined node and edge profiles; building test graph database models respectively corresponding to alternative test profiles for modeling the orphan record; and building a production graph database model based at least in part on the test profile corresponding to the test graph database model exhibiting the best identity tracing characteristics among all the test graph database models.
G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
17.
Systems and methods for verifying activity computer-implemented methods, systems comprising computer-readable media, and electronic devices for activity verification within a network computing environment
A computer-implemented method for activity verification within a network computing environment. The method may include: retrieving a verification requirement defining an activity within the network computing environment, a candidate verifier, and contact information for the candidate verifier; transmitting a request for participation to the candidate verifier; upon confirmation, enrolling the confirmed verifier to the verification requirement; receiving a post-enrollment data record relating to an observed activity within the network computing environment; matching the observed activity to the verification requirement; transmitting a verification request to the enrolled confirmed verifier; receiving a verification response from the enrolled confirmed verifier; based on the verification response, generating a command to restrict or permit the observed activity within the network computing environment.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
18.
Computer-implemented methods, systems comprising computer-readable media, and electronic devices for narrative-structured representation of and intervention into a network computing environment
A computer-implemented method for narrative-structured representation of and intervention into a network computing environment. The method may include: attaching an enabled action program to an abstracted natural language narrative, where execution of the enabled action program causes pre-determined changes in the behavior and/or capabilities of an entity within the network computing environment; generating a representation of the abstracted natural language narrative that includes an enabled action link and an abstraction-toggle link for retrieval of a representation of an unabstracted natural language narrative; upon activation of the abstraction-toggle link, retrieving the representation of the unabstracted natural language narrative; and upon activation of the enabled action link, automatically implementing the pre-determined changes within the network computing environment.
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
19.
Computer-implemented methods, systems comprising computer-readable media, and electronic devices for resource preservation and intervention within a network computing environment
A computer-implemented method for resource preservation and intervention. The method may include: enumerating a plurality of resources within a network computing environment based on data elements relating to activities and/or resources in the environment; classifying the resources under one of a plurality of pre-defined categories; based on the classification, assigning a plurality of enabled action programs to each of the resources, wherein execution of the enabled action programs causes pre-determined changes in the behavior and/or capabilities of the corresponding one of the resources; based on the classification of the resources, applying one of a plurality of data preservation programs to resources within the environment, wherein execution of the data preservation programs causes collection of corresponding pre-defined resource data; and, for each of the resources, exposing the corresponding pre-defined resource data and the assigned enabled action programs to and for use via a client device.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
H04L 41/0813 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
20.
Computer-implemented methods, systems comprising computer-readable media, and electronic devices for autonomous cybersecurity within a network computing environment
A computer-implemented method for autonomous cybersecurity. The method may include: receiving data elements relating to resources and/or activity within a network computing environment; feeding at least some of the elements to an optimizer program to calculate a first distance to a system goal; based on the first distance, implementing pre-determined changes in the environment; receiving post-implementation data records relating to resources and/or activity within the environment; calculating a second distance to the system goal by feeding the post-implementation data records to the optimizer program; and configuring the optimizer program for additional advancement toward the system goal based on comparison of the first and second distances.
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software and mobile applications in the fields
of computer and network security, information technology,
and cybersecurity. Publication of on-line diaries (blogs) on the Internet in
the field of computer and network security. Software as a service (saas) services featuring software for
computer and network security; software as a service (saas)
services, namely, hosting software for use by others for use
in computer and network security; software as a service
(saas) services featuring software using artificial
intelligence for computer and network security; application
service provider (asp) featuring software for use in
computer and network security; application service provider
(asp) featuring software using artificial intelligence for
computer and network security; computer services, namely,
acting as an application service provider in the field of
knowledge management to host computer application software
for the purpose of computer and network security; providing
information in the field of computer and network security;
consulting in the field of information technology; computer
security consultancy; technology consultation in the field
of cybersecurity; technical support services, namely,
technical advice related to computer and network security;
computer services, namely, system and network
administration, system and network monitoring, and system
and network management for others.
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable computer software and mobile application software for use in computer and network security and cybersecurity (1) Publication of on-line diaries (blogs) on the Internet in the field of computer and network security.
(2) Software as a service (saas) services featuring software for computer and network security; software as a service (saas) services, namely, hosting software for use by others for use in computer and network security; software as a service (saas) services featuring software using artificial intelligence for computer and network security; application service provider (asp) featuring software for use in computer and network security; application service provider (asp) featuring software using artificial intelligence for computer and network security; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of computer and network security; providing information in the field of computer and network security; consulting services, namely, assessing information technology security and vulnerability of computers and networks; computer security consultancy; technology consultation in the field of cybersecurity; technical support services, namely, technical advice related to computer and network security; computer services, namely, system and network administration, system and network monitoring, and system and network management for others
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software and mobile applications for monitoring, administration, management, and protecting systems and networks in the fields of computer and network security, information technology, and cybersecurity On-line journals, namely, blogs featuring computer and network security Software as a service (SAAS) services featuring software for computer and network security; Software as a service (SAAS) services, namely, hosting software for use by others for use in computer and network security; Software as a service (SAAS) services featuring software using artificial intelligence for computer and network security; Application service provider (ASP) featuring software for use in computer and network security; Application service provider (ASP) featuring software using artificial intelligence for computer and network security; Computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of computer and network security; Providing information in the field of computer and network security; Consulting in the field of information technology; Computer security consultancy; Technology consultation in the field of cybersecurity; Technical support services, namely, technical advice related to computer and network security; Computer services, namely, system and network administration, system and network monitoring, and system and network management for others