| CPC G06Q 40/08 (2013.01) [H04L 9/3213 (2013.01)] | 20 Claims |

|
1. A method of modeling proof-of-controls, the method comprises:
generating, by one or more processing circuits, at least one proof token by encoding a proof and a posture state based at least on cybersecurity safeguards and firmographic data of at least one entity;
determining, by the one or more processing circuits, a protectability of the at least one entity based on modeling the at least one proof token with a set of protection parameters of a protection provider;
generating, by the one or more processing circuits, a protection product for protection of a computing and networking infrastructure of the at least one entity based on the generated protectability and one or more dynamic value parameters, wherein the one or more dynamic value parameters are dynamically set for the at least one entity based at least on the encoded proof and the encoded posture state of the at least one entity;
providing, by the one or more processing circuits, the protection product;
outputting, by the one or more processing circuits, the at least one proof token to a distributed ledger or data source; and
activating, by the one or more processing circuits, the protection product, wherein activating comprises at least:
establishing at least one connection between the at least one entity and the protection provider; and
identifying, receiving, or monitoring environmental data of the at least one entity based on the activated protection product.
|