SG11202001961VA - Managing cybersecurity vulnerabilities using blockchain networks - Google Patents
Managing cybersecurity vulnerabilities using blockchain networksInfo
- Publication number
- SG11202001961VA SG11202001961VA SG11202001961VA SG11202001961VA SG11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA SG 11202001961V A SG11202001961V A SG 11202001961VA
- Authority
- SG
- Singapore
- Prior art keywords
- blockchain networks
- cybersecurity vulnerabilities
- managing
- managing cybersecurity
- vulnerabilities
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/093365 WO2019170173A2 (en) | 2019-06-27 | 2019-06-27 | Managing cybersecurity vulnerabilities using blockchain networks |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202001961VA true SG11202001961VA (en) | 2020-04-29 |
Family
ID=67847526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202001961VA SG11202001961VA (en) | 2019-06-27 | 2019-06-27 | Managing cybersecurity vulnerabilities using blockchain networks |
Country Status (5)
Country | Link |
---|---|
US (1) | US11122087B2 (en) |
EP (1) | EP3669522B1 (en) |
CN (1) | CN111164948B (en) |
SG (1) | SG11202001961VA (en) |
WO (1) | WO2019170173A2 (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4062308A1 (en) * | 2019-11-19 | 2022-09-28 | Consensys AG | Network multi-tenant architecture for distributed ledger systems |
US11509677B2 (en) | 2020-05-05 | 2022-11-22 | Uber Technologies, Inc. | Automatically detecting vulnerability remediations and regressions |
CN111522683B (en) * | 2020-07-03 | 2020-10-02 | 支付宝(杭州)信息技术有限公司 | Consensus node changing method and related device for badger Byzantine fault-tolerant consensus mechanism |
CN114095187B (en) * | 2020-07-30 | 2023-05-09 | 中国移动通信有限公司研究院 | Threat information application method, threat information application device and computer readable storage medium |
CN111967968B (en) * | 2020-08-18 | 2023-10-24 | 中国银行股份有限公司 | Block chain-based vulnerability processing method and device |
CN112016095B (en) * | 2020-08-20 | 2024-01-12 | 上海帆一尚行科技有限公司 | Method and device for verifying loopholes and electronic equipment |
CN112019538B (en) * | 2020-08-26 | 2023-05-26 | 国网山东省电力公司滨州供电公司 | Remote intelligent alarm system and method for safety equipment and storage medium |
CN112511520A (en) * | 2020-11-23 | 2021-03-16 | 国网山东省电力公司电力科学研究院 | Network security management system and method for power industry |
US12010541B2 (en) * | 2020-12-18 | 2024-06-11 | ThinkRF Corp. | System and method for cryptocurrency incentives in a global distributed crowdsourced spectrum monitoring network |
EP4033725A1 (en) * | 2021-01-22 | 2022-07-27 | Nokia Technologies Oy | Methods and devices for blockchain-based patch management |
CN115529146B (en) * | 2021-06-25 | 2024-10-29 | 中国移动通信集团设计院有限公司 | Network security vulnerability processing system and method |
CN113536321B (en) * | 2021-07-16 | 2023-10-20 | 华北电力科学研究院有限责任公司 | Vulnerability detection method and device |
US20230032836A1 (en) * | 2021-07-30 | 2023-02-02 | Pure Storage, Inc. | Storage System with Blockchain Based Features |
CN114024722A (en) * | 2021-10-13 | 2022-02-08 | 杭州趣链科技有限公司 | Safety detection system based on block chain |
CN114095933A (en) * | 2021-11-18 | 2022-02-25 | 中国银行股份有限公司 | Block chain-based security vulnerability processing method and device |
CN116192383B (en) * | 2023-02-22 | 2023-10-31 | 深圳市怡丰云智科技股份有限公司 | Internet of things monitoring method, device, equipment and storage medium based on ERP encryption |
CN116861446A (en) * | 2023-09-04 | 2023-10-10 | 深圳奥联信息安全技术有限公司 | Data security assessment method and system |
CN117034299B (en) * | 2023-10-09 | 2024-01-26 | 广东时汇信息科技有限公司 | Intelligent contract safety detection system based on block chain |
CN118013583A (en) * | 2024-02-28 | 2024-05-10 | 中国民用航空飞行学院 | Aviation security voluntary reporting method, system, equipment and medium based on blockchain |
Family Cites Families (82)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
MXPA04006473A (en) * | 2001-12-31 | 2004-10-04 | Citadel Security Software Inc | Automated computer vulnerability resolution system. |
US7664845B2 (en) * | 2002-01-15 | 2010-02-16 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US8091117B2 (en) * | 2003-02-14 | 2012-01-03 | Preventsys, Inc. | System and method for interfacing with heterogeneous network data gathering tools |
US8984644B2 (en) * | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US7475427B2 (en) * | 2003-12-12 | 2009-01-06 | International Business Machines Corporation | Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network |
US7634813B2 (en) * | 2004-07-21 | 2009-12-15 | Microsoft Corporation | Self-certifying alert |
US7774848B2 (en) * | 2004-07-23 | 2010-08-10 | Fortinet, Inc. | Mapping remediation to plurality of vulnerabilities |
US20060075503A1 (en) * | 2004-09-13 | 2006-04-06 | Achilles Guard, Inc. Dba Critical Watch | Method and system for applying security vulnerability management process to an organization |
US20060164199A1 (en) | 2005-01-26 | 2006-07-27 | Lockdown Networks, Inc. | Network appliance for securely quarantining a node on a network |
US8239493B2 (en) | 2009-04-21 | 2012-08-07 | International Business Machines Corporation | Automated server controlled client-side logging |
US10027711B2 (en) * | 2009-11-20 | 2018-07-17 | Alert Enterprise, Inc. | Situational intelligence |
US8590047B2 (en) * | 2011-01-04 | 2013-11-19 | Bank Of America Corporation | System and method for management of vulnerability assessment |
US10789373B2 (en) * | 2011-10-31 | 2020-09-29 | Reid Consulting Group, Inc. | System and method for securely storing and sharing information |
WO2014145431A1 (en) * | 2013-03-15 | 2014-09-18 | Socure Inc. | Risk assessment using social networking data |
US9246935B2 (en) * | 2013-10-14 | 2016-01-26 | Intuit Inc. | Method and system for dynamic and comprehensive vulnerability management |
US10832310B2 (en) * | 2014-03-31 | 2020-11-10 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
US9824222B1 (en) * | 2014-05-06 | 2017-11-21 | Synack, Inc. | Method of distributed discovery of vulnerabilities in applications |
US9015847B1 (en) * | 2014-05-06 | 2015-04-21 | Synack, Inc. | Computer system for distributed discovery of vulnerabilities in applications |
US9413780B1 (en) * | 2014-05-06 | 2016-08-09 | Synack, Inc. | Security assessment incentive method for promoting discovery of computer software vulnerabilities |
US9967334B2 (en) * | 2015-03-02 | 2018-05-08 | Dell Products Lp | Computing device configuration and management using a secure decentralized transaction ledger |
US10095878B2 (en) * | 2015-06-02 | 2018-10-09 | ALTR Solutions, Inc. | Internal controls engine and reporting of events generated by a network or associated applications |
US10628764B1 (en) * | 2015-09-15 | 2020-04-21 | Synack, Inc. | Method of automatically generating tasks using control computer |
US9531745B1 (en) * | 2015-11-20 | 2016-12-27 | International Business Machines Corporation | Crowd-sourced security analysis |
US20170178127A1 (en) | 2015-12-18 | 2017-06-22 | International Business Machines Corporation | Proxy system mediated legacy transactions using multi-tenant transaction database |
WO2017173399A1 (en) | 2016-03-31 | 2017-10-05 | Clause, Inc. | System and method for creating and executing data-driven legal contracts |
US10022613B2 (en) | 2016-05-02 | 2018-07-17 | Bao Tran | Smart device |
US10046228B2 (en) * | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
US11838036B2 (en) * | 2016-05-09 | 2023-12-05 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment |
US10489278B2 (en) * | 2016-05-16 | 2019-11-26 | Jpmorgan Chase Bank, N.A. | Method and system for implementing an automation software testing and packaging framework with entitlements |
CA2968710A1 (en) * | 2016-05-31 | 2017-11-30 | Valarie Ann Findlay | Security threat information gathering and incident reporting systems and methods |
US9660870B1 (en) * | 2016-06-08 | 2017-05-23 | Synack, Inc. | Systems and methods of soft patching security vulnerabilities |
US10510031B2 (en) * | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US10108954B2 (en) | 2016-06-24 | 2018-10-23 | PokitDok, Inc. | System and method for cryptographically verified data driven contracts |
US10679267B2 (en) * | 2016-08-03 | 2020-06-09 | Raise Marketplace, Llc | Method and system for consumption based redemption in an exchange item marketplace network |
CN106372514A (en) * | 2016-08-30 | 2017-02-01 | 东软集团股份有限公司 | Security hole maintenance method and security hole maintenance system |
US10445709B2 (en) | 2016-09-28 | 2019-10-15 | The Toronto-Dominion Bank | Real time virtual draft system and method |
US20180108089A1 (en) | 2016-10-14 | 2018-04-19 | International Business Machines Corporation | Transactions and linked assets on a blockchain |
US11176519B2 (en) | 2016-11-11 | 2021-11-16 | International Business Machines Corporation | Smart contract admission check and fault tolerance in a blockchain |
US20180219676A1 (en) | 2017-01-27 | 2018-08-02 | Walmart Apollo, Llc | Managing smart appliances using blockchain technology |
US20180220278A1 (en) * | 2017-02-01 | 2018-08-02 | BriefTrace Ltd. | System and method for securing and verifying information from transportation monitors |
US10375105B2 (en) | 2017-03-03 | 2019-08-06 | International Business Machines Corporation | Blockchain web browser interface |
US20180315145A1 (en) | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Managing school systems on a blockchain |
CN107169765B (en) | 2017-05-11 | 2020-07-31 | 电子科技大学 | Method for dynamically adjusting block chain consensus based on business trust |
US10944546B2 (en) | 2017-07-07 | 2021-03-09 | Microsoft Technology Licensing, Llc | Blockchain object interface |
WO2019068027A1 (en) | 2017-09-29 | 2019-04-04 | PokitDok, Inc. | Blockchain system and method with secure cryptoassets |
US10735203B2 (en) | 2017-10-09 | 2020-08-04 | Cisco Technology, Inc. | Sharing network security threat information using a blockchain network |
US10963400B2 (en) | 2017-10-11 | 2021-03-30 | International Business Machines Corporation | Smart contract creation and monitoring for event identification in a blockchain |
US11063744B2 (en) | 2017-10-20 | 2021-07-13 | Sap Se | Document flow tracking using blockchain |
WO2019089646A1 (en) | 2017-10-30 | 2019-05-09 | Pricewaterhousecoopers Llp | System and method for validation of distributed data storage systems |
US11520880B2 (en) * | 2017-11-03 | 2022-12-06 | International Business Machines Corporation | Identifying internet of things network anomalies using group attestation |
US10659473B2 (en) * | 2017-11-09 | 2020-05-19 | Nokia Solutions And Networks Oy | Method and apparatus for blockchain powered integrity protection system |
US10534923B2 (en) | 2017-11-14 | 2020-01-14 | Wipro Limited | System and method for tracking and managing additive manufacturing of components |
US20190188804A1 (en) | 2017-12-18 | 2019-06-20 | Social Media Compliance Ltd | Platform for automated social media regulatory compliance monitoring |
US11431740B2 (en) * | 2018-01-02 | 2022-08-30 | Criterion Systems, Inc. | Methods and systems for providing an integrated assessment of risk management and maturity for an organizational cybersecurity/privacy program |
US11121872B2 (en) * | 2018-01-23 | 2021-09-14 | Zeronorth, Inc. | Trusted verification of cybersecurity remediation |
US20190251199A1 (en) | 2018-02-14 | 2019-08-15 | Ivan Klianev | Transactions Across Blockchain Networks |
CN108573341B (en) | 2018-03-23 | 2021-09-14 | 杭州云象网络技术有限公司 | Workflow system construction method based on alliance chain |
US11700132B2 (en) * | 2018-05-02 | 2023-07-11 | Cable Television Laboratories, Inc. | Systems and methods for secure event and log management |
US10747201B2 (en) | 2018-05-02 | 2020-08-18 | Rockwell Automation Technologies, Inc. | Subscription-based services using industrial blockchains |
CN108616539B (en) * | 2018-05-03 | 2019-08-20 | 东莞市翔实信息科技有限公司 | A kind of method and system of block chain transaction record access |
CN108898021B (en) * | 2018-06-04 | 2021-06-01 | 北京奇虎科技有限公司 | Threat information processing method, system and computing device based on block chain |
CN108965247A (en) * | 2018-06-04 | 2018-12-07 | 上海交通大学 | A kind of threat information exchange shared system and method based on block chain |
US10581805B2 (en) * | 2018-06-08 | 2020-03-03 | Gcp Ip Holdings I, Llc | Blockchain overwatch |
US10673618B2 (en) * | 2018-06-08 | 2020-06-02 | Cisco Technology, Inc. | Provisioning network resources in a wireless network using a native blockchain platform |
CN109034833B (en) | 2018-06-16 | 2021-07-23 | 复旦大学 | Product tracing information management system and method based on block chain |
US20190384842A1 (en) | 2018-06-19 | 2019-12-19 | Toyota Motor Engineering & Manufacturing North America, Inc. | Systems, methods and data structures for workflow blockchains |
CN108810006B (en) * | 2018-06-25 | 2021-08-10 | 百度在线网络技术(北京)有限公司 | Resource access method, device, equipment and storage medium |
US10979445B2 (en) * | 2018-07-09 | 2021-04-13 | At&T Intellectual Property I, L.P. | Security management of devices using blockchain technology |
US20200028691A1 (en) | 2018-07-20 | 2020-01-23 | Honeywell International Inc. | System and method for a blockchain based automated certifiable workflow process |
US20200053117A1 (en) * | 2018-08-07 | 2020-02-13 | Telesis Corporation | Method, system, and/or software for finding and addressing an information/data or related system's security risk, threat, vulnerability, or similar event, in a computing device or system |
US11245576B2 (en) * | 2018-09-07 | 2022-02-08 | Dell Products L.P. | Blockchain-based configuration profile provisioning system |
US10382473B1 (en) * | 2018-09-12 | 2019-08-13 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
US11769573B2 (en) | 2018-10-16 | 2023-09-26 | Netspective Communications Llc | Team-based tele-diagnostics blockchain-enabled system |
US10958419B2 (en) * | 2018-10-22 | 2021-03-23 | Motorola Solutions, Inc. | Method to establish distributed ledger networks with multiple access levels for an incident |
CN109639646B (en) * | 2018-11-16 | 2020-04-24 | 清华大学 | Block chain-based Internet of things safety detection method and system |
US11190520B2 (en) * | 2018-11-20 | 2021-11-30 | Microsoft Technology Licensing, Llc | Blockchain smart contracts for digital asset access |
CN109729068B (en) * | 2018-11-23 | 2021-05-07 | 北京丁牛科技有限公司 | Security vulnerability auditing system based on block chain technology |
CN109639464A (en) | 2018-11-23 | 2019-04-16 | 武汉烽火技术服务有限公司 | IDC network patrol method and system based on WEB interface |
CN109544192A (en) | 2018-11-29 | 2019-03-29 | 黄秋红 | A kind of anti-fake source tracing method of collection based on block chain technology |
CN109767190A (en) | 2018-12-29 | 2019-05-17 | 中国工商银行股份有限公司 | Across mechanism workflow processing method, platform and system based on block chain |
US11265348B2 (en) * | 2019-01-14 | 2022-03-01 | International Business Machines Corporation | Ongoing and on-demand secure verification of audit compliance |
US11372980B2 (en) * | 2019-06-14 | 2022-06-28 | Netiq Corporation | Blockchains for software component vulnerability databases |
-
2019
- 2019-06-27 EP EP19763410.8A patent/EP3669522B1/en active Active
- 2019-06-27 CN CN201980004311.6A patent/CN111164948B/en active Active
- 2019-06-27 SG SG11202001961VA patent/SG11202001961VA/en unknown
- 2019-06-27 WO PCT/CN2019/093365 patent/WO2019170173A2/en unknown
- 2019-12-12 US US16/712,340 patent/US11122087B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20200412766A1 (en) | 2020-12-31 |
CN111164948B (en) | 2022-05-27 |
EP3669522A2 (en) | 2020-06-24 |
CN111164948A (en) | 2020-05-15 |
US11122087B2 (en) | 2021-09-14 |
WO2019170173A3 (en) | 2020-04-23 |
WO2019170173A2 (en) | 2019-09-12 |
EP3669522A4 (en) | 2020-08-19 |
EP3669522B1 (en) | 2021-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202001961VA (en) | Managing cybersecurity vulnerabilities using blockchain networks | |
IL288030B (en) | Rate-optimized congestion management | |
GB2589312B (en) | Quantum-safe networking | |
ZA201907229B (en) | Cross-asset trading within blockchain networks | |
GB201912667D0 (en) | Electrosurgiccal network | |
EP3758642C0 (en) | Electrosurgical network | |
EP3616426C0 (en) | Network policy configuration | |
SG11202010075XA (en) | Multi-uav management | |
GB2573651B (en) | Network vulnerability assessment | |
EP3756324A4 (en) | Network security | |
IL292873A (en) | Spatio-temporal-interactive networks | |
GB2584120B (en) | Network security | |
EP3854025A4 (en) | Credentials management | |
GB201900480D0 (en) | Network management | |
GB2583703B (en) | Communications network | |
GB201905589D0 (en) | Communications network | |
GB2578453B (en) | Software defined networks | |
EP3888017A4 (en) | Multi-forecast networks | |
GB2602208B (en) | Quantum-safe networking | |
GB2601926B (en) | Quantum-safe networking | |
GB2583931B (en) | Network vulnerability detection | |
GB201802257D0 (en) | Network | |
GB202209819D0 (en) | Electrosurgical network | |
GB2582987B (en) | Network management | |
GB2614629B (en) | Electrosurgical network |