US 12,267,325 B2
Localized machine learning of user behaviors in network operating system for enhanced secure services in secure data network
Billy Gayle Moon, Apex, NC (US)
Assigned to WhiteStar Communications, Inc., Durham, NC (US)
Filed by WhiteStar Communications, Inc., Durham, NC (US)
Filed on Jul. 16, 2021, as Appl. No. 17/378,312.
Prior Publication US 2023/0020504 A1, Jan. 19, 2023
Int. Cl. H04L 9/40 (2022.01); G06F 9/54 (2006.01); G06N 20/00 (2019.01); H04L 67/104 (2022.01)
CPC H04L 63/10 (2013.01) [G06F 9/541 (2013.01); G06N 20/00 (2019.01); H04L 67/104 (2013.01)] 22 Claims
OG exemplary drawing
 
1. A method comprising:
initiating, by a secure executable container executed by a network device, a two-way trusted relationship with a second network device in a secure peer-to-peer data network, wherein:
each physical network device in the secure peer-to-peer data network executes the secure executable container,
the secure executable container maintains exclusive control to any access of the secure peer-to-peer data network,
the secure peer-to-peer data network is established based on an aggregation of a plurality of the two-way trusted relationships,
the secure peer-to-peer data network is cloudless, and
no network device in the secure peer-to-peer data network uses a certificate issued by a third party certifying authority;
initiating, by an executable agent within the secure executable container, a monitoring of a network-based service between the network device and the second network device having the corresponding two-way trusted relationship with the network device within the secure peer-to-peer data network, the network-based service based on one or more of a first secure data structure having a secure storage in the network device or a second secure data structure for secure communications in the secure peer-to-peer data network;
executing, by the executable agent, a secure machine learning operation based on one or more user actions associated with the network-based service, wherein the secure executable container prevents any executable resource in the network device from:
accessing any unencrypted form of the first or second secure data structures without authorized access via a prescribed Application Programming Interface (API) required by and executed within the secure executable container, and
accessing the secure peer-to-peer data network without authorized access via a prescribed Application Programming Interface (API) required by and executed within the secure executable container; and
autonomically executing, by the executable agent, an improved operation for the network-based service based on the secure machine learning operation; wherein
each and every data packet that is to traverse the secure peer-to-peer data network is always encrypted by the secure executable container into a corresponding secure data packet, and
the secure executable container is different than an operating system executed by the network device, and the secure executable container is different from the operating system providing the network device with access to a second data network that is distinct from the secure peer-to-peer data network.