[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

SG11202001961VA - Managing cybersecurity vulnerabilities using blockchain networks - Google Patents

Managing cybersecurity vulnerabilities using blockchain networks

Info

Publication number
SG11202001961VA
SG11202001961VA SG11202001961VA SG11202001961VA SG11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA
Authority
SG
Singapore
Prior art keywords
blockchain networks
cybersecurity vulnerabilities
managing
managing cybersecurity
vulnerabilities
Prior art date
Application number
SG11202001961VA
Inventor
Jun Gu
Yixiang Zhang
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG11202001961VA publication Critical patent/SG11202001961VA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
SG11202001961VA 2019-06-27 2019-06-27 Managing cybersecurity vulnerabilities using blockchain networks SG11202001961VA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/093365 WO2019170173A2 (en) 2019-06-27 2019-06-27 Managing cybersecurity vulnerabilities using blockchain networks

Publications (1)

Publication Number Publication Date
SG11202001961VA true SG11202001961VA (en) 2020-04-29

Family

ID=67847526

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202001961VA SG11202001961VA (en) 2019-06-27 2019-06-27 Managing cybersecurity vulnerabilities using blockchain networks

Country Status (5)

Country Link
US (1) US11122087B2 (en)
EP (1) EP3669522B1 (en)
CN (1) CN111164948B (en)
SG (1) SG11202001961VA (en)
WO (1) WO2019170173A2 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4062308A1 (en) * 2019-11-19 2022-09-28 Consensys AG Network multi-tenant architecture for distributed ledger systems
US11509677B2 (en) 2020-05-05 2022-11-22 Uber Technologies, Inc. Automatically detecting vulnerability remediations and regressions
CN111522683B (en) * 2020-07-03 2020-10-02 支付宝(杭州)信息技术有限公司 Consensus node changing method and related device for badger Byzantine fault-tolerant consensus mechanism
CN114095187B (en) * 2020-07-30 2023-05-09 中国移动通信有限公司研究院 Threat information application method, threat information application device and computer readable storage medium
CN111967968B (en) * 2020-08-18 2023-10-24 中国银行股份有限公司 Block chain-based vulnerability processing method and device
CN112016095B (en) * 2020-08-20 2024-01-12 上海帆一尚行科技有限公司 Method and device for verifying loopholes and electronic equipment
CN112019538B (en) * 2020-08-26 2023-05-26 国网山东省电力公司滨州供电公司 Remote intelligent alarm system and method for safety equipment and storage medium
CN112511520A (en) * 2020-11-23 2021-03-16 国网山东省电力公司电力科学研究院 Network security management system and method for power industry
US12010541B2 (en) * 2020-12-18 2024-06-11 ThinkRF Corp. System and method for cryptocurrency incentives in a global distributed crowdsourced spectrum monitoring network
EP4033725A1 (en) * 2021-01-22 2022-07-27 Nokia Technologies Oy Methods and devices for blockchain-based patch management
CN115529146B (en) * 2021-06-25 2024-10-29 中国移动通信集团设计院有限公司 Network security vulnerability processing system and method
CN113536321B (en) * 2021-07-16 2023-10-20 华北电力科学研究院有限责任公司 Vulnerability detection method and device
US20230032836A1 (en) * 2021-07-30 2023-02-02 Pure Storage, Inc. Storage System with Blockchain Based Features
CN114024722A (en) * 2021-10-13 2022-02-08 杭州趣链科技有限公司 Safety detection system based on block chain
CN114095933A (en) * 2021-11-18 2022-02-25 中国银行股份有限公司 Block chain-based security vulnerability processing method and device
CN116192383B (en) * 2023-02-22 2023-10-31 深圳市怡丰云智科技股份有限公司 Internet of things monitoring method, device, equipment and storage medium based on ERP encryption
CN116861446A (en) * 2023-09-04 2023-10-10 深圳奥联信息安全技术有限公司 Data security assessment method and system
CN117034299B (en) * 2023-10-09 2024-01-26 广东时汇信息科技有限公司 Intelligent contract safety detection system based on block chain
CN118013583A (en) * 2024-02-28 2024-05-10 中国民用航空飞行学院 Aviation security voluntary reporting method, system, equipment and medium based on blockchain

Family Cites Families (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MXPA04006473A (en) * 2001-12-31 2004-10-04 Citadel Security Software Inc Automated computer vulnerability resolution system.
US7664845B2 (en) * 2002-01-15 2010-02-16 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8091117B2 (en) * 2003-02-14 2012-01-03 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US8984644B2 (en) * 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US7475427B2 (en) * 2003-12-12 2009-01-06 International Business Machines Corporation Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network
US7634813B2 (en) * 2004-07-21 2009-12-15 Microsoft Corporation Self-certifying alert
US7774848B2 (en) * 2004-07-23 2010-08-10 Fortinet, Inc. Mapping remediation to plurality of vulnerabilities
US20060075503A1 (en) * 2004-09-13 2006-04-06 Achilles Guard, Inc. Dba Critical Watch Method and system for applying security vulnerability management process to an organization
US20060164199A1 (en) 2005-01-26 2006-07-27 Lockdown Networks, Inc. Network appliance for securely quarantining a node on a network
US8239493B2 (en) 2009-04-21 2012-08-07 International Business Machines Corporation Automated server controlled client-side logging
US10027711B2 (en) * 2009-11-20 2018-07-17 Alert Enterprise, Inc. Situational intelligence
US8590047B2 (en) * 2011-01-04 2013-11-19 Bank Of America Corporation System and method for management of vulnerability assessment
US10789373B2 (en) * 2011-10-31 2020-09-29 Reid Consulting Group, Inc. System and method for securely storing and sharing information
WO2014145431A1 (en) * 2013-03-15 2014-09-18 Socure Inc. Risk assessment using social networking data
US9246935B2 (en) * 2013-10-14 2016-01-26 Intuit Inc. Method and system for dynamic and comprehensive vulnerability management
US10832310B2 (en) * 2014-03-31 2020-11-10 Monticello Enterprises LLC System and method for providing a search entity-based payment process
US9824222B1 (en) * 2014-05-06 2017-11-21 Synack, Inc. Method of distributed discovery of vulnerabilities in applications
US9015847B1 (en) * 2014-05-06 2015-04-21 Synack, Inc. Computer system for distributed discovery of vulnerabilities in applications
US9413780B1 (en) * 2014-05-06 2016-08-09 Synack, Inc. Security assessment incentive method for promoting discovery of computer software vulnerabilities
US9967334B2 (en) * 2015-03-02 2018-05-08 Dell Products Lp Computing device configuration and management using a secure decentralized transaction ledger
US10095878B2 (en) * 2015-06-02 2018-10-09 ALTR Solutions, Inc. Internal controls engine and reporting of events generated by a network or associated applications
US10628764B1 (en) * 2015-09-15 2020-04-21 Synack, Inc. Method of automatically generating tasks using control computer
US9531745B1 (en) * 2015-11-20 2016-12-27 International Business Machines Corporation Crowd-sourced security analysis
US20170178127A1 (en) 2015-12-18 2017-06-22 International Business Machines Corporation Proxy system mediated legacy transactions using multi-tenant transaction database
WO2017173399A1 (en) 2016-03-31 2017-10-05 Clause, Inc. System and method for creating and executing data-driven legal contracts
US10022613B2 (en) 2016-05-02 2018-07-17 Bao Tran Smart device
US10046228B2 (en) * 2016-05-02 2018-08-14 Bao Tran Smart device
US11838036B2 (en) * 2016-05-09 2023-12-05 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment
US10489278B2 (en) * 2016-05-16 2019-11-26 Jpmorgan Chase Bank, N.A. Method and system for implementing an automation software testing and packaging framework with entitlements
CA2968710A1 (en) * 2016-05-31 2017-11-30 Valarie Ann Findlay Security threat information gathering and incident reporting systems and methods
US9660870B1 (en) * 2016-06-08 2017-05-23 Synack, Inc. Systems and methods of soft patching security vulnerabilities
US10510031B2 (en) * 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10108954B2 (en) 2016-06-24 2018-10-23 PokitDok, Inc. System and method for cryptographically verified data driven contracts
US10679267B2 (en) * 2016-08-03 2020-06-09 Raise Marketplace, Llc Method and system for consumption based redemption in an exchange item marketplace network
CN106372514A (en) * 2016-08-30 2017-02-01 东软集团股份有限公司 Security hole maintenance method and security hole maintenance system
US10445709B2 (en) 2016-09-28 2019-10-15 The Toronto-Dominion Bank Real time virtual draft system and method
US20180108089A1 (en) 2016-10-14 2018-04-19 International Business Machines Corporation Transactions and linked assets on a blockchain
US11176519B2 (en) 2016-11-11 2021-11-16 International Business Machines Corporation Smart contract admission check and fault tolerance in a blockchain
US20180219676A1 (en) 2017-01-27 2018-08-02 Walmart Apollo, Llc Managing smart appliances using blockchain technology
US20180220278A1 (en) * 2017-02-01 2018-08-02 BriefTrace Ltd. System and method for securing and verifying information from transportation monitors
US10375105B2 (en) 2017-03-03 2019-08-06 International Business Machines Corporation Blockchain web browser interface
US20180315145A1 (en) 2017-05-01 2018-11-01 International Business Machines Corporation Managing school systems on a blockchain
CN107169765B (en) 2017-05-11 2020-07-31 电子科技大学 Method for dynamically adjusting block chain consensus based on business trust
US10944546B2 (en) 2017-07-07 2021-03-09 Microsoft Technology Licensing, Llc Blockchain object interface
WO2019068027A1 (en) 2017-09-29 2019-04-04 PokitDok, Inc. Blockchain system and method with secure cryptoassets
US10735203B2 (en) 2017-10-09 2020-08-04 Cisco Technology, Inc. Sharing network security threat information using a blockchain network
US10963400B2 (en) 2017-10-11 2021-03-30 International Business Machines Corporation Smart contract creation and monitoring for event identification in a blockchain
US11063744B2 (en) 2017-10-20 2021-07-13 Sap Se Document flow tracking using blockchain
WO2019089646A1 (en) 2017-10-30 2019-05-09 Pricewaterhousecoopers Llp System and method for validation of distributed data storage systems
US11520880B2 (en) * 2017-11-03 2022-12-06 International Business Machines Corporation Identifying internet of things network anomalies using group attestation
US10659473B2 (en) * 2017-11-09 2020-05-19 Nokia Solutions And Networks Oy Method and apparatus for blockchain powered integrity protection system
US10534923B2 (en) 2017-11-14 2020-01-14 Wipro Limited System and method for tracking and managing additive manufacturing of components
US20190188804A1 (en) 2017-12-18 2019-06-20 Social Media Compliance Ltd Platform for automated social media regulatory compliance monitoring
US11431740B2 (en) * 2018-01-02 2022-08-30 Criterion Systems, Inc. Methods and systems for providing an integrated assessment of risk management and maturity for an organizational cybersecurity/privacy program
US11121872B2 (en) * 2018-01-23 2021-09-14 Zeronorth, Inc. Trusted verification of cybersecurity remediation
US20190251199A1 (en) 2018-02-14 2019-08-15 Ivan Klianev Transactions Across Blockchain Networks
CN108573341B (en) 2018-03-23 2021-09-14 杭州云象网络技术有限公司 Workflow system construction method based on alliance chain
US11700132B2 (en) * 2018-05-02 2023-07-11 Cable Television Laboratories, Inc. Systems and methods for secure event and log management
US10747201B2 (en) 2018-05-02 2020-08-18 Rockwell Automation Technologies, Inc. Subscription-based services using industrial blockchains
CN108616539B (en) * 2018-05-03 2019-08-20 东莞市翔实信息科技有限公司 A kind of method and system of block chain transaction record access
CN108898021B (en) * 2018-06-04 2021-06-01 北京奇虎科技有限公司 Threat information processing method, system and computing device based on block chain
CN108965247A (en) * 2018-06-04 2018-12-07 上海交通大学 A kind of threat information exchange shared system and method based on block chain
US10581805B2 (en) * 2018-06-08 2020-03-03 Gcp Ip Holdings I, Llc Blockchain overwatch
US10673618B2 (en) * 2018-06-08 2020-06-02 Cisco Technology, Inc. Provisioning network resources in a wireless network using a native blockchain platform
CN109034833B (en) 2018-06-16 2021-07-23 复旦大学 Product tracing information management system and method based on block chain
US20190384842A1 (en) 2018-06-19 2019-12-19 Toyota Motor Engineering & Manufacturing North America, Inc. Systems, methods and data structures for workflow blockchains
CN108810006B (en) * 2018-06-25 2021-08-10 百度在线网络技术(北京)有限公司 Resource access method, device, equipment and storage medium
US10979445B2 (en) * 2018-07-09 2021-04-13 At&T Intellectual Property I, L.P. Security management of devices using blockchain technology
US20200028691A1 (en) 2018-07-20 2020-01-23 Honeywell International Inc. System and method for a blockchain based automated certifiable workflow process
US20200053117A1 (en) * 2018-08-07 2020-02-13 Telesis Corporation Method, system, and/or software for finding and addressing an information/data or related system's security risk, threat, vulnerability, or similar event, in a computing device or system
US11245576B2 (en) * 2018-09-07 2022-02-08 Dell Products L.P. Blockchain-based configuration profile provisioning system
US10382473B1 (en) * 2018-09-12 2019-08-13 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US11769573B2 (en) 2018-10-16 2023-09-26 Netspective Communications Llc Team-based tele-diagnostics blockchain-enabled system
US10958419B2 (en) * 2018-10-22 2021-03-23 Motorola Solutions, Inc. Method to establish distributed ledger networks with multiple access levels for an incident
CN109639646B (en) * 2018-11-16 2020-04-24 清华大学 Block chain-based Internet of things safety detection method and system
US11190520B2 (en) * 2018-11-20 2021-11-30 Microsoft Technology Licensing, Llc Blockchain smart contracts for digital asset access
CN109729068B (en) * 2018-11-23 2021-05-07 北京丁牛科技有限公司 Security vulnerability auditing system based on block chain technology
CN109639464A (en) 2018-11-23 2019-04-16 武汉烽火技术服务有限公司 IDC network patrol method and system based on WEB interface
CN109544192A (en) 2018-11-29 2019-03-29 黄秋红 A kind of anti-fake source tracing method of collection based on block chain technology
CN109767190A (en) 2018-12-29 2019-05-17 中国工商银行股份有限公司 Across mechanism workflow processing method, platform and system based on block chain
US11265348B2 (en) * 2019-01-14 2022-03-01 International Business Machines Corporation Ongoing and on-demand secure verification of audit compliance
US11372980B2 (en) * 2019-06-14 2022-06-28 Netiq Corporation Blockchains for software component vulnerability databases

Also Published As

Publication number Publication date
US20200412766A1 (en) 2020-12-31
CN111164948B (en) 2022-05-27
EP3669522A2 (en) 2020-06-24
CN111164948A (en) 2020-05-15
US11122087B2 (en) 2021-09-14
WO2019170173A3 (en) 2020-04-23
WO2019170173A2 (en) 2019-09-12
EP3669522A4 (en) 2020-08-19
EP3669522B1 (en) 2021-11-24

Similar Documents

Publication Publication Date Title
SG11202001961VA (en) Managing cybersecurity vulnerabilities using blockchain networks
IL288030B (en) Rate-optimized congestion management
GB2589312B (en) Quantum-safe networking
ZA201907229B (en) Cross-asset trading within blockchain networks
GB201912667D0 (en) Electrosurgiccal network
EP3758642C0 (en) Electrosurgical network
EP3616426C0 (en) Network policy configuration
SG11202010075XA (en) Multi-uav management
GB2573651B (en) Network vulnerability assessment
EP3756324A4 (en) Network security
IL292873A (en) Spatio-temporal-interactive networks
GB2584120B (en) Network security
EP3854025A4 (en) Credentials management
GB201900480D0 (en) Network management
GB2583703B (en) Communications network
GB201905589D0 (en) Communications network
GB2578453B (en) Software defined networks
EP3888017A4 (en) Multi-forecast networks
GB2602208B (en) Quantum-safe networking
GB2601926B (en) Quantum-safe networking
GB2583931B (en) Network vulnerability detection
GB201802257D0 (en) Network
GB202209819D0 (en) Electrosurgical network
GB2582987B (en) Network management
GB2614629B (en) Electrosurgical network