US 11,928,205 B1
Systems and methods for implementing cybersecurity using blockchain validation
Henry Tumblin, Castine, ME (US); and Gary Southwell, Leander, TX (US)
Assigned to CSP Inc., Lowell, MA (US)
Filed by CSP Inc., Lowell, MA (US)
Filed on May 2, 2022, as Appl. No. 17/735,101.
Application 17/735,101 is a continuation of application No. 17/684,363, filed on Mar. 1, 2022.
Int. Cl. G06F 21/54 (2013.01); G06F 21/55 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/54 (2013.01) [G06F 21/554 (2013.01); G06F 21/602 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method performed at a computing device having memory and one or more processors, the method comprising:
accessing a trust store for the computing device, including obtaining a blockchain for the trust store;
identifying a first change to the trust store;
in response to identifying the first change, generating a first block and inserting the first block into the blockchain, wherein the first block includes a first encrypted digest for the first change and a first block digest, and the first block has a block type selected from the group consisting of: a trust binary type, a blocklist type, a policy type, and a local trust binary type;
identifying a second change to the trust store; and
in response to identifying the second change, generating a second block and inserting the second block into the blockchain, wherein the second block includes a second encrypted digest for the second change, a second block digest, and the first block digest.